Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
payment swift.exe

Overview

General Information

Sample Name:payment swift.exe
Analysis ID:755998
MD5:0eb99950c8a30fee01ebfdaa33498b22
SHA1:54557815e576ac70fcbcdfcb6765f3d2a2dff507
SHA256:469dae2eed97bbfe08ae548308e77aedcd0795fb4b2b1abcdd1a0315fe1ff216
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AgentTesla
Yara detected AntiVM3
Multi AV Scanner detection for dropped file
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains very large array initializations
Machine Learning detection for dropped file
Hides that the sample has been downloaded from the Internet (zone.identifier)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Uses SMTP (mail sending)
Found evasive API chain (may stop execution after accessing registry keys)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • payment swift.exe (PID: 3100 cmdline: C:\Users\user\Desktop\payment swift.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
    • payment swift.exe (PID: 4460 cmdline: C:\Users\user\Desktop\payment swift.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
  • WdFVsOe.exe (PID: 2460 cmdline: "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe" MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
    • WdFVsOe.exe (PID: 4768 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
  • WdFVsOe.exe (PID: 5992 cmdline: "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe" MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
    • WdFVsOe.exe (PID: 972 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
    • WdFVsOe.exe (PID: 1276 cmdline: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe MD5: 0EB99950C8A30FEE01EBFDAA33498B22)
  • cleanup
{"Exfil Mode": "SMTP", "Host": "host39.registrar-servers.com", "Username": "dickson@potashin.us", "Password": "*r4} Du LH  n87G"}
SourceRuleDescriptionAuthorStrings
00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_AgentTesla_d3ac2b2funknownunknown
      • 0x31d17:$a13: get_DnsResolver
      • 0x30424:$a20: get_LastAccessed
      • 0x32745:$a27: set_InternalServerPort
      • 0x32a7a:$a30: set_GuidMasterKey
      • 0x30536:$a33: get_Clipboard
      • 0x30544:$a34: get_Keyboard
      • 0x31911:$a35: get_ShiftKeyDown
      • 0x31922:$a36: get_AltKeyDown
      • 0x30551:$a37: get_Password
      • 0x3106c:$a38: get_PasswordHash
      • 0x32179:$a39: get_DefaultCredentials
      00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
        00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Click to see the 22 entries
          SourceRuleDescriptionAuthorStrings
          2.2.WdFVsOe.exe.25e063c.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            2.2.WdFVsOe.exe.25e063c.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPasteDetects executables potentially checking for WinJail sandbox windowditekSHen
            • 0xcfea:$v1: SbieDll.dll
            • 0xd004:$v2: USER
            • 0xd010:$v3: SANDBOX
            • 0xd022:$v4: VIRUS
            • 0xd072:$v4: VIRUS
            • 0xd030:$v5: MALWARE
            • 0xd042:$v6: SCHMIDTI
            • 0xd056:$v7: CURRENTUSER
            0.2.payment swift.exe.4392240.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.payment swift.exe.4392240.6.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                0.2.payment swift.exe.4392240.6.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                • 0x32c56:$s10: logins
                • 0x326d0:$s11: credential
                • 0x2e936:$g1: get_Clipboard
                • 0x2e944:$g2: get_Keyboard
                • 0x2e951:$g3: get_Password
                • 0x2fd01:$g4: get_CtrlKeyDown
                • 0x2fd11:$g5: get_ShiftKeyDown
                • 0x2fd22:$g6: get_AltKeyDown
                Click to see the 25 entries
                No Sigma rule has matched
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: payment swift.exeReversingLabs: Detection: 30%
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeReversingLabs: Detection: 30%
                Source: payment swift.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJoe Sandbox ML: detected
                Source: 1.0.payment swift.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                Source: 0.2.payment swift.exe.4392240.6.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Host": "host39.registrar-servers.com", "Username": "dickson@potashin.us", "Password": "*r4} Du LH n87G"}
                Source: payment swift.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: payment swift.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Joe Sandbox ViewIP Address: 68.65.122.214 68.65.122.214
                Source: global trafficTCP traffic: 192.168.2.4:49695 -> 68.65.122.214:587
                Source: global trafficTCP traffic: 192.168.2.4:49695 -> 68.65.122.214:587
                Source: payment swift.exe, 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                Source: WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNSnamejidpasswordPsi/Psi
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                Source: payment swift.exe, 00000001.00000002.585869850.0000000006020000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                Source: WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comor
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://host39.registrar-servers.com
                Source: WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://kjkcOA.com
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com09
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: WdFVsOe.exe, 00000006.00000002.578885319.0000000002E4C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579991612.0000000002EC5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://D16a0atI7uWaj.com
                Source: WdFVsOe.exe, 00000003.00000002.577583432.0000000002B6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.578885319.0000000002E4C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://D16a0atI7uWaj.comX
                Source: payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                Source: payment swift.exe, 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www
                Source: unknownDNS traffic detected: queries for: host39.registrar-servers.com
                Source: payment swift.exe, 00000000.00000002.314965866.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 2.2.WdFVsOe.exe.25e063c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.payment swift.exe.30605f0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 2.2.WdFVsOe.exe.25c2e6c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.payment swift.exe.3042e20.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f Author: unknown
                Source: initial sampleStatic PE information: Filename: payment swift.exe
                Source: 1.0.payment swift.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b0E0679B2u002d33DEu002d4D95u002d91A6u002dB53FD5CAAFFCu007d/C3E9AD79u002dA89Eu002d49B7u002dBD79u002dAAE98BEF935A.csLarge array initialization: .cctor: array initializer size 10947
                Source: payment swift.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.2.WdFVsOe.exe.25e063c.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.payment swift.exe.30605f0.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 2.2.WdFVsOe.exe.25c2e6c.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.payment swift.exe.3042e20.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTRMatched rule: Windows_Trojan_AgentTesla_d3ac2b2f reference_sample = 65463161760af7ab85f5c475a0f7b1581234a1e714a2c5a555783bdd203f85f4, os = windows, severity = x86, creation_date = 2021-03-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.AgentTesla, fingerprint = cbbb56fe6cd7277ae9595a10e05e2ce535a4e6bf205810be0bbce3a883b6f8bc, id = d3ac2b2f-14fc-4851-8a57-41032e386aeb, last_modified = 2022-06-20
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_0146C1640_2_0146C164
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_0146E5A20_2_0146E5A2
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_0146E5B00_2_0146E5B0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_07AC6EC00_2_07AC6EC0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_07AC00060_2_07AC0006
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0290FAA01_2_0290FAA0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_02906CA21_2_02906CA2
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0290BB271_2_0290BB27
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C6C5501_2_05C6C550
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C6A0881_2_05C6A088
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C6D2B01_2_05C6D2B0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C629F81_2_05C629F8
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C609101_2_05C60910
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_05C600401_2_05C60040
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06138EF01_2_06138EF0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0613E7781_2_0613E778
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061300401_2_06130040
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0613B9101_2_0613B910
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06138E8C1_2_06138E8C
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061347581_2_06134758
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06131F881_2_06131F88
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061369E01_2_061369E0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061652A81_2_061652A8
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061663201_2_06166320
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061600401_2_06160040
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0616BF481_2_0616BF48
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06165B981_2_06165B98
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_0616A7B11_2_0616A7B1
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_0243C1642_2_0243C164
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_0243E5A22_2_0243E5A2
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_0243E5B02_2_0243E5B0
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_06B76EC02_2_06B76EC0
                Source: payment swift.exe, 00000000.00000002.320676583.0000000007820000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.314965866.0000000001240000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename249b56aa-023a-4323-a10f-63343cbc6341.exe4 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePrecision.dll6 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameInspector.dllN vs payment swift.exe
                Source: payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename249b56aa-023a-4323-a10f-63343cbc6341.exe4 vs payment swift.exe
                Source: payment swift.exe, 00000000.00000000.297023516.0000000000B6A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebHnw.exeB vs payment swift.exe
                Source: payment swift.exe, 00000001.00000002.564549054.0000000000B58000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs payment swift.exe
                Source: payment swift.exe, 00000001.00000000.313798542.0000000000438000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename249b56aa-023a-4323-a10f-63343cbc6341.exe4 vs payment swift.exe
                Source: payment swift.exeBinary or memory string: OriginalFilenamebHnw.exeB vs payment swift.exe
                Source: payment swift.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: WdFVsOe.exe.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: payment swift.exeReversingLabs: Detection: 30%
                Source: C:\Users\user\Desktop\payment swift.exeFile read: C:\Users\user\Desktop\payment swift.exeJump to behavior
                Source: payment swift.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\payment swift.exe C:\Users\user\Desktop\payment swift.exe
                Source: C:\Users\user\Desktop\payment swift.exeProcess created: C:\Users\user\Desktop\payment swift.exe C:\Users\user\Desktop\payment swift.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe "C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                Source: C:\Users\user\Desktop\payment swift.exeProcess created: C:\Users\user\Desktop\payment swift.exe C:\Users\user\Desktop\payment swift.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\payment swift.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\payment swift.exe.logJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeFile created: C:\Users\user\AppData\Local\Temp\tmp13F9.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@11/4@3/1
                Source: payment swift.exe, 00000000.00000000.296923534.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into User_Transportation(UserID,TransportationID) values (@UserID,@TransID);
                Source: payment swift.exe, 00000000.00000000.296923534.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into TourPlace(Name,Location,TicketPrice) values (@name,@location,@ticket);
                Source: payment swift.exe, 00000000.00000000.296923534.0000000000A82000.00000002.00000001.01000000.00000003.sdmp, WdFVsOe.exe.1.drBinary or memory string: insert into User_TourPlace(UserID,TourPlaceID) values (@UserID,@TourplaceID);
                Source: payment swift.exe, 00000001.00000002.578471634.0000000002E6A000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.577540601.0000000002B6A000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.578850588.0000000002E47000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: payment swift.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\payment swift.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: payment swift.exeString found in binary or memory: AddUserButton'AddUserPhoneTextbox'AdduserEmailtextbox-Adduserpasswordtextbox
                Source: payment swift.exeString found in binary or memory: Username:-AddusertextBoxUsernameCash
                Source: 1.0.payment swift.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: 1.0.payment swift.exe.400000.0.unpack, A/f2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                Source: C:\Users\user\Desktop\payment swift.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\payment swift.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: payment swift.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: payment swift.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 0_2_07AC35FB push eax; retf 0_2_07AC35FC
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06130040 push es; iretd 1_2_06130EB0
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_061344FD push es; retf 1_2_06134548
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06134141 push es; retf 1_2_061344FC
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06134549 push es; retf 1_2_06134594
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06133590 push es; retf 1_2_061344FC
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeCode function: 2_2_06B735FB push eax; retf 2_2_06B735FC
                Source: initial sampleStatic PE information: section name: .text entropy: 7.664774300353232
                Source: initial sampleStatic PE information: section name: .text entropy: 7.664774300353232
                Source: C:\Users\user\Desktop\payment swift.exeFile created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to dropped file
                Source: C:\Users\user\Desktop\payment swift.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOeJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOeJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Users\user\Desktop\payment swift.exeFile opened: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess information set: NOOPENFILEERRORBOX

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 2.2.WdFVsOe.exe.25e063c.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.30605f0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.WdFVsOe.exe.25c2e6c.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.3042e20.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.360150897.00000000025A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 2460, type: MEMORYSTR
                Source: payment swift.exe, 00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmp, payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000002.00000002.360150897.00000000025A1000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000004.00000002.387309784.00000000028A8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: payment swift.exe, 00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmp, payment swift.exe, 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000002.00000002.360150897.00000000025A1000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000004.00000002.387309784.00000000028A8000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\payment swift.exe TID: 400Thread sleep time: -38122s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 4832Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -16602069666338586s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5892Thread sleep count: 9812 > 30Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99858s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99732s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99623s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99504s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99344s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99123s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -99015s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98904s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98793s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98657s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98370s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98264s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98124s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -98015s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97906s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97793s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97468s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97356s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exe TID: 5900Thread sleep time: -97109s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 3720Thread sleep time: -38122s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5048Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -100000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 4920Thread sleep count: 9817 > 30Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99844s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99719s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99602s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99453s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99328s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99219s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -99108s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98982s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98868s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98643s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98500s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98371s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98219s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -98109s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97998s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97501s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97360s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97202s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -97072s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -96515s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5104Thread sleep time: -96405s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5976Thread sleep time: -38122s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 3456Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -15679732462653109s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -100000s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 1244Thread sleep count: 9836 > 30
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99870s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99750s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99620s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99500s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99391s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99265s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99156s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -99043s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98906s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98797s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98656s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98523s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98406s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98297s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98185s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -98078s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97964s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97856s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97744s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97637s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97512s >= -30000s
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe TID: 5248Thread sleep time: -97344s >= -30000s
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\Desktop\payment swift.exeWindow / User API: threadDelayed 9812Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWindow / User API: threadDelayed 9817Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWindow / User API: threadDelayed 9836
                Source: C:\Users\user\Desktop\payment swift.exeEvasive API call chain: RegQueryValue,DecisionNodes,Sleepgraph_1-48356
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\payment swift.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Users\user\Desktop\payment swift.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 38122Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99858Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99732Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99623Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99504Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99344Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99234Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99123Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 99015Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98904Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98793Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98657Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98484Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98370Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98264Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98124Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 98015Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97906Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97793Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97687Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97578Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97468Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97356Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97218Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeThread delayed: delay time: 97109Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 38122Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 100000Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99844Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99719Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99602Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99453Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99328Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99219Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99108Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98982Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98868Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98643Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98500Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98371Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98219Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98109Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97998Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97501Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97360Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97202Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97072Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 96515Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 96405Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 38122Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 922337203685477
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 100000
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99870
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99750
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99620
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99500
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99391
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99265
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99156
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 99043
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98906
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98797
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98656
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98523
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98406
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98297
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98185
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 98078
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97964
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97856
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97744
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97637
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97512
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeThread delayed: delay time: 97344
                Source: WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                Source: WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: WdFVsOe.exe, 00000004.00000002.387309784.00000000028A8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: WdFVsOe.exe, 00000004.00000002.387853297.0000000002B65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\payment swift.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeCode function: 1_2_06135110 LdrInitializeThunk,1_2_06135110
                Source: C:\Users\user\Desktop\payment swift.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeProcess created: C:\Users\user\Desktop\payment swift.exe C:\Users\user\Desktop\payment swift.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeProcess created: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Users\user\Desktop\payment swift.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Users\user\Desktop\payment swift.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 4768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 1276, type: MEMORYSTR
                Source: C:\Users\user\Desktop\payment swift.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\payment swift.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: Yara matchFile source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 4768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 1276, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.payment swift.exe.4392240.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.0.payment swift.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.42fe420.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.4392240.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.payment swift.exe.427e9d0.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 3100, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: payment swift.exe PID: 4460, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 4768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: WdFVsOe.exe PID: 1276, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts211
                Windows Management Instrumentation
                1
                Registry Run Keys / Startup Folder
                11
                Process Injection
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                114
                System Information Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default Accounts2
                Command and Scripting Interpreter
                Boot or Logon Initialization Scripts1
                Registry Run Keys / Startup Folder
                1
                Deobfuscate/Decode Files or Information
                1
                Input Capture
                311
                Security Software Discovery
                Remote Desktop Protocol2
                Data from Local System
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                1
                Credentials in Registry
                1
                Process Discovery
                SMB/Windows Admin Shares1
                Email Collection
                Automated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)3
                Software Packing
                NTDS131
                Virtualization/Sandbox Evasion
                Distributed Component Object Model1
                Input Capture
                Scheduled Transfer11
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Masquerading
                LSA Secrets1
                Application Window Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common131
                Virtualization/Sandbox Evasion
                Cached Domain Credentials1
                Remote System Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                Process Injection
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                Hidden Files and Directories
                Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 signatures2 2 Behavior Graph ID: 755998 Sample: payment swift.exe Startdate: 29/11/2022 Architecture: WINDOWS Score: 100 33 Malicious sample detected (through community Yara rule) 2->33 35 Multi AV Scanner detection for submitted file 2->35 37 Yara detected AgentTesla 2->37 39 7 other signatures 2->39 6 WdFVsOe.exe 3 2->6         started        9 payment swift.exe 3 2->9         started        12 WdFVsOe.exe 2 2->12         started        process3 file4 41 Multi AV Scanner detection for dropped file 6->41 43 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 6->43 45 Machine Learning detection for dropped file 6->45 47 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 6->47 14 WdFVsOe.exe 3 6->14         started        29 C:\Users\user\...\payment swift.exe.log, ASCII 9->29 dropped 18 payment swift.exe 2 6 9->18         started        21 WdFVsOe.exe 3 12->21         started        23 WdFVsOe.exe 12->23         started        signatures5 process6 dnsIp7 31 host39.registrar-servers.com 68.65.122.214, 49695, 49696, 49697 NAMECHEAP-NETUS United States 18->31 25 C:\Users\user\AppData\Roaming\...\WdFVsOe.exe, PE32 18->25 dropped 27 C:\Users\user\...\WdFVsOe.exe:Zone.Identifier, ASCII 18->27 dropped 49 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 18->49 51 Tries to steal Mail credentials (via file / registry access) 18->51 53 Hides that the sample has been downloaded from the Internet (zone.identifier) 18->53 55 Tries to harvest and steal ftp login credentials 21->55 57 Tries to harvest and steal browser information (history, passwords, etc) 21->57 file8 signatures9

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                payment swift.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                payment swift.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe30%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                SourceDetectionScannerLabelLinkDownload
                1.0.payment swift.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
                https://sectigo.com/CPS00%URL Reputationsafe
                http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://www0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://DynDns.comDynDNSnamejidpasswordPsi/Psi0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                https://D16a0atI7uWaj.comX0%Avira URL Cloudsafe
                http://ocsp.sectigo.com090%Avira URL Cloudsafe
                http://kjkcOA.com0%Avira URL Cloudsafe
                https://D16a0atI7uWaj.com0%Avira URL Cloudsafe
                http://crl.comor0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                host39.registrar-servers.com
                68.65.122.214
                truefalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://127.0.0.1:HTTP/1.1payment swift.exe, 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://www.apache.org/licenses/LICENSE-2.0payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designersGpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://sectigo.com/CPS0payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/?payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/bThepayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://ocsp.sectigo.com09payment swift.exe, 00000001.00000002.568239695.0000000000C61000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.568309572.0000000000C69000.00000004.00000020.00020000.00000000.sdmp, payment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://www.fontbureau.com/designers?payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://host39.registrar-servers.compayment swift.exe, 00000001.00000002.578503982.0000000002E6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.578453028.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579742937.0000000002EA2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.ziphttps://wwwpayment swift.exe, 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.tiro.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designerspayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.krpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.carterandcone.comlpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sajatypeworks.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.typography.netDpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designers/cabarga.htmlNpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/cThepayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.galapagosdesign.com/staff/dennis.htmpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://fontfabrik.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.founder.com.cn/cnpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://D16a0atI7uWaj.comXWdFVsOe.exe, 00000003.00000002.577583432.0000000002B6F000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.578885319.0000000002E4C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.fontbureau.com/designers/frere-user.htmlpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.jiyu-kobo.co.jp/payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://kjkcOA.comWdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://DynDns.comDynDNSnamejidpasswordPsi/PsiWdFVsOe.exe, 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/DPleasepayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers8payment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.fonts.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sandoll.co.krpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        https://D16a0atI7uWaj.comWdFVsOe.exe, 00000006.00000002.578885319.0000000002E4C000.00000004.00000800.00020000.00000000.sdmp, WdFVsOe.exe, 00000006.00000002.579991612.0000000002EC5000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://www.urwpp.deDPleasepayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.zhongyicts.com.cnpayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://www.sakkal.compayment swift.exe, 00000000.00000002.319963745.0000000006F82000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://crl.comorWdFVsOe.exe, 00000003.00000002.587147691.0000000006360000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        68.65.122.214
                                        host39.registrar-servers.comUnited States
                                        22612NAMECHEAP-NETUSfalse
                                        Joe Sandbox Version:36.0.0 Rainbow Opal
                                        Analysis ID:755998
                                        Start date and time:2022-11-29 13:26:11 +01:00
                                        Joe Sandbox Product:CloudBasic
                                        Overall analysis duration:0h 9m 5s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Sample file name:payment swift.exe
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                        Number of analysed new started processes analysed:12
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • HDC enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@11/4@3/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HDC Information:Failed
                                        HCA Information:
                                        • Successful, ratio: 95%
                                        • Number of executed functions: 118
                                        • Number of non-executed functions: 5
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        TimeTypeDescription
                                        13:27:09API Interceptor694x Sleep call for process: payment swift.exe modified
                                        13:27:19AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        13:27:27AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run WdFVsOe C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                        13:27:29API Interceptor947x Sleep call for process: WdFVsOe.exe modified
                                        MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                        68.65.122.214SWIFT Payment W076001.exeGet hashmaliciousBrowse
                                          file.exeGet hashmaliciousBrowse
                                            New Order.exeGet hashmaliciousBrowse
                                              New Order.exeGet hashmaliciousBrowse
                                                RFQ E22-0350 pdf.zip.exeGet hashmaliciousBrowse
                                                  file.exeGet hashmaliciousBrowse
                                                    file.exeGet hashmaliciousBrowse
                                                      SecuriteInfo.com.Win32.PWSX-gen.5615.5540.exeGet hashmaliciousBrowse
                                                        65plwEdhrs.exeGet hashmaliciousBrowse
                                                          PO-2100193237.xlsGet hashmaliciousBrowse
                                                            NEW ORDER.exeGet hashmaliciousBrowse
                                                              SecuriteInfo.com.Trojan.Packed2.44634.11417.32113.exeGet hashmaliciousBrowse
                                                                SOA001.xlsGet hashmaliciousBrowse
                                                                  mW3lylpp53.exeGet hashmaliciousBrowse
                                                                    doc06983120221101093537.exeGet hashmaliciousBrowse
                                                                      Doc20220929105022.exeGet hashmaliciousBrowse
                                                                        zfRyc49sNH.exeGet hashmaliciousBrowse
                                                                          swiftcopy.xlsGet hashmaliciousBrowse
                                                                            100% Advance Payment Needed.xlsGet hashmaliciousBrowse
                                                                              lPqZd4hhzj.exeGet hashmaliciousBrowse
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                host39.registrar-servers.comSWIFT Payment W076001.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                file.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                New Order.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                New Order.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                RFQ E22-0350 pdf.zip.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                file.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                file.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                SecuriteInfo.com.Win32.PWSX-gen.5615.5540.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                65plwEdhrs.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                PO-2100193237.xlsGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                NEW ORDER.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                SecuriteInfo.com.Trojan.Packed2.44634.11417.32113.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                SOA001.xlsGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                mW3lylpp53.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                doc06983120221101093537.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                Doc20220929105022.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                zfRyc49sNH.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                swiftcopy.xlsGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                100% Advance Payment Needed.xlsGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                lPqZd4hhzj.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                                                                NAMECHEAP-NETUShttps://myteachingvideo.org/nmp2aGet hashmaliciousBrowse
                                                                                • 192.64.117.40
                                                                                New PO-RJ-IN-003 - Knauf Queimados.exeGet hashmaliciousBrowse
                                                                                • 198.54.121.81
                                                                                PI-1366091200.jsGet hashmaliciousBrowse
                                                                                • 198.54.122.135
                                                                                JsX27X5dti.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.109
                                                                                http://ideentiifire.comGet hashmaliciousBrowse
                                                                                • 192.64.119.238
                                                                                https://sites.google.com/view/uas-invite/homeGet hashmaliciousBrowse
                                                                                • 199.192.16.22
                                                                                FCA000200010005.PDF.exeGet hashmaliciousBrowse
                                                                                • 162.0.228.17
                                                                                BL-NO-OOLU2136901180.vbsGet hashmaliciousBrowse
                                                                                • 198.54.117.216
                                                                                Purchase Order No. 4502717956.exeGet hashmaliciousBrowse
                                                                                • 162.213.255.142
                                                                                https://jpnetworkbd.com/aab/index.php?atu-qui=6Get hashmaliciousBrowse
                                                                                • 68.65.120.179
                                                                                hZmf6K2R58.exeGet hashmaliciousBrowse
                                                                                • 199.192.20.95
                                                                                https://indd.adobe.com/view/afe6bfe7-4ef8-49fa-b099-03bbf908dd26Get hashmaliciousBrowse
                                                                                • 162.0.235.22
                                                                                paystub_11_24_2022.htmlGet hashmaliciousBrowse
                                                                                • 68.65.122.77
                                                                                SWIFT Payment W076001.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                file.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                file.exeGet hashmaliciousBrowse
                                                                                • 198.54.115.69
                                                                                New Order.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                Lakeringernes (1).exeGet hashmaliciousBrowse
                                                                                • 162.0.238.93
                                                                                https://robuxify.me/Get hashmaliciousBrowse
                                                                                • 162.213.251.63
                                                                                New Order.exeGet hashmaliciousBrowse
                                                                                • 68.65.122.214
                                                                                No context
                                                                                No context
                                                                                Process:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1216
                                                                                Entropy (8bit):5.355304211458859
                                                                                Encrypted:false
                                                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                                Malicious:false
                                                                                Reputation:high, very likely benign file
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                                Process:C:\Users\user\Desktop\payment swift.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:dropped
                                                                                Size (bytes):1216
                                                                                Entropy (8bit):5.355304211458859
                                                                                Encrypted:false
                                                                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                                                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                                                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                                                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                                                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                                                                Malicious:true
                                                                                Reputation:high, very likely benign file
                                                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                                                                Process:C:\Users\user\Desktop\payment swift.exe
                                                                                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Category:dropped
                                                                                Size (bytes):945664
                                                                                Entropy (8bit):7.6581864683594505
                                                                                Encrypted:false
                                                                                SSDEEP:12288:3COqU+QmQCIcQNPy74FM33rWkwxrjbd9IWKRnyZ1V+Db6H6mXH7iODdzoa1cfN:SWmhQNzFM33KrNnO+V+Db6HNiODdEPf
                                                                                MD5:0EB99950C8A30FEE01EBFDAA33498B22
                                                                                SHA1:54557815E576AC70FCBCDFCB6765F3D2A2DFF507
                                                                                SHA-256:469DAE2EED97BBFE08AE548308E77AEDCD0795FB4B2B1ABCDD1A0315FE1FF216
                                                                                SHA-512:7641E3432CDEC9CCE11E474713DB3363403F85745F7AE8D92F576D5F4F1901E90C997BF11D3DC65F906B344F8D1FF6E28DE330C674623F9C9B251BE8E1342E2D
                                                                                Malicious:true
                                                                                Antivirus:
                                                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                • Antivirus: ReversingLabs, Detection: 30%
                                                                                Reputation:low
                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....c..............0..f............... ........@.. ....................................@.................................X...O.................................................................................... ............... ..H............text....e... ...f.................. ..`.rsrc................h..............@..@.reloc...............l..............@..B........................H.......<...........l...8u.. ...........................................^..}.....(.......(.....*.0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0...........s......o......(.....*...0..+.........,..{.......+....,...{....o........(.....*..0..r.............(....s......s....}.....s....}.....s....}.....s....}.....(......{....(....o......{.....o......{.....o .....{....r...p"..@A...s!...o".....{....(#...o$.....{.... .... ..
                                                                                Process:C:\Users\user\Desktop\payment swift.exe
                                                                                File Type:ASCII text, with CRLF line terminators
                                                                                Category:modified
                                                                                Size (bytes):26
                                                                                Entropy (8bit):3.95006375643621
                                                                                Encrypted:false
                                                                                SSDEEP:3:ggPYV:rPYV
                                                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                                Malicious:true
                                                                                Reputation:high, very likely benign file
                                                                                Preview:[ZoneTransfer]....ZoneId=0
                                                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                Entropy (8bit):7.6581864683594505
                                                                                TrID:
                                                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                • Windows Screen Saver (13104/52) 0.07%
                                                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                File name:payment swift.exe
                                                                                File size:945664
                                                                                MD5:0eb99950c8a30fee01ebfdaa33498b22
                                                                                SHA1:54557815e576ac70fcbcdfcb6765f3d2a2dff507
                                                                                SHA256:469dae2eed97bbfe08ae548308e77aedcd0795fb4b2b1abcdd1a0315fe1ff216
                                                                                SHA512:7641e3432cdec9cce11e474713db3363403f85745f7ae8d92f576d5f4f1901e90c997bf11d3dc65f906b344f8d1ff6e28de330c674623f9c9b251be8e1342e2d
                                                                                SSDEEP:12288:3COqU+QmQCIcQNPy74FM33rWkwxrjbd9IWKRnyZ1V+Db6H6mXH7iODdzoa1cfN:SWmhQNzFM33KrNnO+V+Db6HNiODdEPf
                                                                                TLSH:1E15D08033A2AF71F5296BF67821900827763C5EA5F1D2286EDDF0DE2676B5049F0B17
                                                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......c..............0..f............... ........@.. ....................................@................................
                                                                                Icon Hash:00828e8e8686b000
                                                                                Entrypoint:0x4e85aa
                                                                                Entrypoint Section:.text
                                                                                Digitally signed:false
                                                                                Imagebase:0x400000
                                                                                Subsystem:windows gui
                                                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                Time Stamp:0x6385B3CD [Tue Nov 29 07:25:01 2022 UTC]
                                                                                TLS Callbacks:
                                                                                CLR (.Net) Version:
                                                                                OS Version Major:4
                                                                                OS Version Minor:0
                                                                                File Version Major:4
                                                                                File Version Minor:0
                                                                                Subsystem Version Major:4
                                                                                Subsystem Version Minor:0
                                                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                Instruction
                                                                                jmp dword ptr [00402000h]
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                add byte ptr [eax], al
                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xe85580x4f.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xea0000x388.rsrc
                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xec0000xc.reloc
                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                .text0x20000xe65b00xe6600False0.8272061940450353PGP symmetric key encrypted data - Plaintext or unencrypted data7.664774300353232IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                .rsrc0xea0000x3880x400False0.3720703125data2.8564669469222315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                .reloc0xec0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                NameRVASizeTypeLanguageCountry
                                                                                RT_VERSION0xea0580x32cdata
                                                                                DLLImport
                                                                                mscoree.dll_CorExeMain
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Nov 29, 2022 13:27:27.737919092 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:27.906387091 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:27.906543970 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:28.230930090 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:28.231297016 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:28.411633015 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:28.412159920 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:28.582920074 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:28.630537987 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:28.641078949 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:28.827491999 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:28.827521086 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:28.827538013 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:28.827548981 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:28.827672005 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:28.834069014 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:28.880552053 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:28.943869114 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:29.123837948 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:29.177495003 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:29.207124949 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:29.378030062 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:29.382957935 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:29.555260897 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:29.556241035 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:29.744044065 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:29.745124102 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:29.913490057 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:29.914035082 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:30.116836071 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:30.117255926 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:30.285303116 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:30.313560963 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:30.314049006 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:30.314532042 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:30.314614058 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:30.481308937 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:30.481446028 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:30.482685089 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:30.493328094 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:30.537200928 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:52.961391926 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:53.131294012 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:53.139246941 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:53.371095896 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:53.375797987 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:53.545335054 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:53.545738935 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:53.718911886 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:53.743896008 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:53.930495024 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:53.930560112 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:53.930602074 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:53.930634022 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:53.930641890 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:53.930711985 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:53.933422089 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:53.976525068 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:54.141011953 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:54.312279940 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:54.351562977 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:54.413350105 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:54.582950115 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:54.583501101 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:54.753087997 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:54.788609982 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:54.966085911 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:55.007924080 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:55.286735058 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:55.456346035 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:55.490048885 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:55.664738894 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:55.710999966 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:55.712172985 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:55.881733894 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:56.117333889 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:56.262183905 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:56.262289047 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:56.262352943 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:56.262420893 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:27:56.431560993 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:56.431605101 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:56.431633949 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:56.431664944 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:56.436434984 CET5874969668.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:27:56.617333889 CET49696587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:05.598038912 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:05.764733076 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:05.764971972 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:06.114202976 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.114742041 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:06.282293081 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.288638115 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:06.459296942 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.486413956 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:06.701844931 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.710268021 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.710328102 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.710361004 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.710397005 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.710566998 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:06.710566998 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:06.713570118 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.722640991 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:06.889765978 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.890362978 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:06.948740005 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:07.116432905 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:07.117058992 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:07.285322905 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:07.285998106 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:07.473339081 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:07.474436998 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:07.641817093 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:07.642560005 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:07.845711946 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:07.846112967 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:08.013151884 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:08.014214039 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:08.014324903 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:08.014401913 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:08.014480114 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:28:08.181421995 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:08.181472063 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:08.181503057 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:08.181535006 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:08.192357063 CET5874969768.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:28:08.243287086 CET49697587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:29:07.673605919 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:29:07.881539106 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:29:08.238169909 CET5874969568.65.122.214192.168.2.4
                                                                                Nov 29, 2022 13:29:08.289478064 CET49695587192.168.2.468.65.122.214
                                                                                Nov 29, 2022 13:29:08.329596996 CET49695587192.168.2.468.65.122.214
                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                Nov 29, 2022 13:27:27.661490917 CET5657253192.168.2.48.8.8.8
                                                                                Nov 29, 2022 13:27:27.680375099 CET53565728.8.8.8192.168.2.4
                                                                                Nov 29, 2022 13:27:52.909621000 CET5091153192.168.2.48.8.8.8
                                                                                Nov 29, 2022 13:27:52.929089069 CET53509118.8.8.8192.168.2.4
                                                                                Nov 29, 2022 13:28:05.553168058 CET5968353192.168.2.48.8.8.8
                                                                                Nov 29, 2022 13:28:05.574378014 CET53596838.8.8.8192.168.2.4
                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                Nov 29, 2022 13:27:27.661490917 CET192.168.2.48.8.8.80x201dStandard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                                                                Nov 29, 2022 13:27:52.909621000 CET192.168.2.48.8.8.80xe05dStandard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                                                                Nov 29, 2022 13:28:05.553168058 CET192.168.2.48.8.8.80x22fdStandard query (0)host39.registrar-servers.comA (IP address)IN (0x0001)false
                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                Nov 29, 2022 13:27:27.680375099 CET8.8.8.8192.168.2.40x201dNo error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                                                                Nov 29, 2022 13:27:52.929089069 CET8.8.8.8192.168.2.40xe05dNo error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                                                                Nov 29, 2022 13:28:05.574378014 CET8.8.8.8192.168.2.40x22fdNo error (0)host39.registrar-servers.com68.65.122.214A (IP address)IN (0x0001)false
                                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                                Nov 29, 2022 13:27:28.230930090 CET5874969568.65.122.214192.168.2.4220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 07:27:28 -0500
                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                220 and/or bulk e-mail.
                                                                                Nov 29, 2022 13:27:28.231297016 CET49695587192.168.2.468.65.122.214EHLO 767668
                                                                                Nov 29, 2022 13:27:28.411633015 CET5874969568.65.122.214192.168.2.4250-host39.registrar-servers.com Hello 767668 [102.129.143.49]
                                                                                250-SIZE 52428800
                                                                                250-8BITMIME
                                                                                250-PIPELINING
                                                                                250-PIPE_CONNECT
                                                                                250-AUTH PLAIN LOGIN
                                                                                250-STARTTLS
                                                                                250 HELP
                                                                                Nov 29, 2022 13:27:28.412159920 CET49695587192.168.2.468.65.122.214STARTTLS
                                                                                Nov 29, 2022 13:27:28.582920074 CET5874969568.65.122.214192.168.2.4220 TLS go ahead
                                                                                Nov 29, 2022 13:27:53.371095896 CET5874969668.65.122.214192.168.2.4220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 07:27:53 -0500
                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                220 and/or bulk e-mail.
                                                                                Nov 29, 2022 13:27:53.375797987 CET49696587192.168.2.468.65.122.214EHLO 767668
                                                                                Nov 29, 2022 13:27:53.545335054 CET5874969668.65.122.214192.168.2.4250-host39.registrar-servers.com Hello 767668 [102.129.143.49]
                                                                                250-SIZE 52428800
                                                                                250-8BITMIME
                                                                                250-PIPELINING
                                                                                250-PIPE_CONNECT
                                                                                250-AUTH PLAIN LOGIN
                                                                                250-STARTTLS
                                                                                250 HELP
                                                                                Nov 29, 2022 13:27:53.545738935 CET49696587192.168.2.468.65.122.214STARTTLS
                                                                                Nov 29, 2022 13:27:53.718911886 CET5874969668.65.122.214192.168.2.4220 TLS go ahead
                                                                                Nov 29, 2022 13:28:06.114202976 CET5874969768.65.122.214192.168.2.4220-host39.registrar-servers.com ESMTP Exim 4.95 #2 Tue, 29 Nov 2022 07:28:06 -0500
                                                                                220-We do not authorize the use of this system to transport unsolicited,
                                                                                220 and/or bulk e-mail.
                                                                                Nov 29, 2022 13:28:06.114742041 CET49697587192.168.2.468.65.122.214EHLO 767668
                                                                                Nov 29, 2022 13:28:06.282293081 CET5874969768.65.122.214192.168.2.4250-host39.registrar-servers.com Hello 767668 [102.129.143.49]
                                                                                250-SIZE 52428800
                                                                                250-8BITMIME
                                                                                250-PIPELINING
                                                                                250-PIPE_CONNECT
                                                                                250-AUTH PLAIN LOGIN
                                                                                250-STARTTLS
                                                                                250 HELP
                                                                                Nov 29, 2022 13:28:06.288638115 CET49697587192.168.2.468.65.122.214STARTTLS
                                                                                Nov 29, 2022 13:28:06.459296942 CET5874969768.65.122.214192.168.2.4220 TLS go ahead

                                                                                Click to jump to process

                                                                                Click to jump to process

                                                                                Click to dive into process behavior distribution

                                                                                Click to jump to process

                                                                                Target ID:0
                                                                                Start time:13:27:03
                                                                                Start date:29/11/2022
                                                                                Path:C:\Users\user\Desktop\payment swift.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Users\user\Desktop\payment swift.exe
                                                                                Imagebase:0xa80000
                                                                                File size:945664 bytes
                                                                                MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.315807649.00000000030D5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000000.00000002.318247702.000000000427E000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.315641125.0000000003021000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:low

                                                                                Target ID:1
                                                                                Start time:13:27:11
                                                                                Start date:29/11/2022
                                                                                Path:C:\Users\user\Desktop\payment swift.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Users\user\Desktop\payment swift.exe
                                                                                Imagebase:0x6d0000
                                                                                File size:945664 bytes
                                                                                MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                                                                Has elevated privileges:true
                                                                                Has administrator privileges:true
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: Windows_Trojan_AgentTesla_d3ac2b2f, Description: unknown, Source: 00000001.00000000.313645910.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.570872866.0000000002B41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:low

                                                                                Target ID:2
                                                                                Start time:13:27:27
                                                                                Start date:29/11/2022
                                                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                                                                                Imagebase:0x1f0000
                                                                                File size:945664 bytes
                                                                                MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000002.00000002.360649511.0000000002655000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000002.00000002.360150897.00000000025A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                Antivirus matches:
                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                • Detection: 30%, ReversingLabs
                                                                                Reputation:low

                                                                                Target ID:3
                                                                                Start time:13:27:31
                                                                                Start date:29/11/2022
                                                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                Imagebase:0x4c0000
                                                                                File size:945664 bytes
                                                                                MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.569999847.0000000002841000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:low

                                                                                Target ID:4
                                                                                Start time:13:27:35
                                                                                Start date:29/11/2022
                                                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:"C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe"
                                                                                Imagebase:0x400000
                                                                                File size:945664 bytes
                                                                                MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Reputation:low

                                                                                Target ID:5
                                                                                Start time:13:27:43
                                                                                Start date:29/11/2022
                                                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                Wow64 process (32bit):false
                                                                                Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                Imagebase:0xf0000
                                                                                File size:945664 bytes
                                                                                MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:C, C++ or other language
                                                                                Reputation:low

                                                                                Target ID:6
                                                                                Start time:13:27:43
                                                                                Start date:29/11/2022
                                                                                Path:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                Wow64 process (32bit):true
                                                                                Commandline:C:\Users\user\AppData\Roaming\WdFVsOe\WdFVsOe.exe
                                                                                Imagebase:0x650000
                                                                                File size:945664 bytes
                                                                                MD5 hash:0EB99950C8A30FEE01EBFDAA33498B22
                                                                                Has elevated privileges:false
                                                                                Has administrator privileges:false
                                                                                Programmed in:.Net C# or VB.NET
                                                                                Yara matches:
                                                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.571356587.0000000002B2C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                Reputation:low

                                                                                Reset < >

                                                                                  Execution Graph

                                                                                  Execution Coverage:10.3%
                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                  Signature Coverage:0%
                                                                                  Total number of Nodes:104
                                                                                  Total number of Limit Nodes:11
                                                                                  execution_graph 14693 14640d0 14694 14640e2 14693->14694 14695 14640ee 14694->14695 14699 14641e0 14694->14699 14704 1463c64 14695->14704 14697 146410d 14700 1464205 14699->14700 14708 14642e0 14700->14708 14712 14642d1 14700->14712 14705 1463c6f 14704->14705 14720 14651a4 14705->14720 14707 1466a50 14707->14697 14709 1464307 14708->14709 14711 14643e4 14709->14711 14716 1463de4 14709->14716 14714 14642e0 14712->14714 14713 14643e4 14713->14713 14714->14713 14715 1463de4 CreateActCtxA 14714->14715 14715->14713 14717 1465370 CreateActCtxA 14716->14717 14719 1465433 14717->14719 14721 14651af 14720->14721 14724 14657f8 14721->14724 14723 1466af5 14723->14707 14725 1465803 14724->14725 14728 1465828 14725->14728 14727 1466bda 14727->14723 14729 1465833 14728->14729 14732 1465858 14729->14732 14731 1466cca 14731->14727 14733 1465863 14732->14733 14734 146741c 14733->14734 14736 146b2f0 14733->14736 14734->14731 14737 146b321 14736->14737 14738 146b345 14737->14738 14741 146b5b8 14737->14741 14745 146b5a9 14737->14745 14738->14734 14742 146b5c5 14741->14742 14744 146b5ff 14742->14744 14750 14697b8 14742->14750 14744->14738 14746 146b5b2 14745->14746 14747 146b525 14745->14747 14748 14697b8 LoadLibraryExW 14746->14748 14749 146b5ff 14746->14749 14748->14749 14749->14738 14751 14697c3 14750->14751 14752 146c2f8 14751->14752 14754 1469880 14751->14754 14755 146988b 14754->14755 14756 146c367 14755->14756 14757 1465858 LoadLibraryExW 14755->14757 14761 146e0d8 14756->14761 14767 146e0e8 14756->14767 14757->14756 14758 146c3a0 14758->14752 14763 146e165 14761->14763 14764 146e119 14761->14764 14762 146e125 14762->14758 14763->14758 14764->14762 14765 146e558 LoadLibraryExW 14764->14765 14766 146e568 LoadLibraryExW 14764->14766 14765->14763 14766->14763 14769 146e119 14767->14769 14770 146e165 14767->14770 14768 146e125 14768->14758 14769->14768 14771 146e558 LoadLibraryExW 14769->14771 14772 146e568 LoadLibraryExW 14769->14772 14770->14758 14771->14770 14772->14770 14773 14691d0 14774 14691df 14773->14774 14777 14692c8 14773->14777 14782 14692b8 14773->14782 14778 14692db 14777->14778 14779 14692eb 14778->14779 14787 1469948 14778->14787 14791 1469958 14778->14791 14779->14774 14783 14692db 14782->14783 14784 14692eb 14783->14784 14785 1469948 LoadLibraryExW 14783->14785 14786 1469958 LoadLibraryExW 14783->14786 14784->14774 14785->14784 14786->14784 14788 1469958 14787->14788 14790 1469991 14788->14790 14795 14694b8 14788->14795 14790->14779 14792 146996c 14791->14792 14793 1469991 14792->14793 14794 14694b8 LoadLibraryExW 14792->14794 14793->14779 14794->14793 14796 1469b38 LoadLibraryExW 14795->14796 14798 1469bb1 14796->14798 14798->14790 14799 146b6d0 GetCurrentProcess 14800 146b743 14799->14800 14801 146b74a GetCurrentThread 14799->14801 14800->14801 14802 146b787 GetCurrentProcess 14801->14802 14803 146b780 14801->14803 14804 146b7bd 14802->14804 14803->14802 14805 146b7e5 GetCurrentThreadId 14804->14805 14806 146b816 14805->14806 14807 14698b0 14808 14698f2 14807->14808 14809 14698f8 GetModuleHandleW 14807->14809 14808->14809 14810 1469925 14809->14810 14687 7ac8020 14688 7ac81ab 14687->14688 14689 7ac8046 14687->14689 14689->14688 14691 7ac82a0 PostMessageW 14689->14691 14692 7ac830c 14691->14692 14692->14689 14811 146fd38 14812 146fda0 CreateWindowExW 14811->14812 14814 146fe5c 14812->14814 14814->14814 14815 146b8f8 DuplicateHandle 14816 146b98e 14815->14816

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32 ref: 0146B730
                                                                                  • GetCurrentThread.KERNEL32 ref: 0146B76D
                                                                                  • GetCurrentProcess.KERNEL32 ref: 0146B7AA
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0146B803
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: Current$ProcessThread
                                                                                  • String ID:
                                                                                  • API String ID: 2063062207-0
                                                                                  • Opcode ID: 232e8be9d163d6e70ef0af705f84eb01f2169996a0c2d9bbdd39e06b8b495174
                                                                                  • Instruction ID: a05977fa48e7e625c686152b964cd110dbf2bbc6220fa30324e19badccca8d3d
                                                                                  • Opcode Fuzzy Hash: 232e8be9d163d6e70ef0af705f84eb01f2169996a0c2d9bbdd39e06b8b495174
                                                                                  • Instruction Fuzzy Hash: AB5136B0E002498FDB14CFAAC548B9EBBF5EB48318F24855EE549A7360D7346984CF65
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32 ref: 0146B730
                                                                                  • GetCurrentThread.KERNEL32 ref: 0146B76D
                                                                                  • GetCurrentProcess.KERNEL32 ref: 0146B7AA
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0146B803
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: Current$ProcessThread
                                                                                  • String ID:
                                                                                  • API String ID: 2063062207-0
                                                                                  • Opcode ID: da282563507eb85729846ab0acfb09aea3f6c21f61893f29a36e638704608b52
                                                                                  • Instruction ID: 37dd06b51163bccbbe972eb994b267c10809a9adb569a848be8429d00a4497b0
                                                                                  • Opcode Fuzzy Hash: da282563507eb85729846ab0acfb09aea3f6c21f61893f29a36e638704608b52
                                                                                  • Instruction Fuzzy Hash: CC5136B0E002498FDB14CFAAC548B9EBBF5FB48318F24855EE549A7360D7346984CF65
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 39 146fd2c-146fd9e 40 146fda0-146fda6 39->40 41 146fda9-146fdb0 39->41 40->41 42 146fdb2-146fdb8 41->42 43 146fdbb-146fdf3 41->43 42->43 44 146fdfb-146fe5a CreateWindowExW 43->44 45 146fe63-146fe9b 44->45 46 146fe5c-146fe62 44->46 50 146fe9d-146fea0 45->50 51 146fea8 45->51 46->45 50->51 52 146fea9 51->52 52->52
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0146FE4A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 716092398-0
                                                                                  • Opcode ID: d6e1ea49c8c85b55e52559d84096a2d1b3fd6e218b2d8e93b03426e798a335fc
                                                                                  • Instruction ID: 2a54c622337af4d37ca0bbf898d1c86ea51d01a4998e1184a57aaaa3d500e2e4
                                                                                  • Opcode Fuzzy Hash: d6e1ea49c8c85b55e52559d84096a2d1b3fd6e218b2d8e93b03426e798a335fc
                                                                                  • Instruction Fuzzy Hash: 7451CFB1D103089FDF14CFA9D884ADEBFB5BF88314F24852AE819AB210D774A945CF91
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 53 146fd38-146fd9e 54 146fda0-146fda6 53->54 55 146fda9-146fdb0 53->55 54->55 56 146fdb2-146fdb8 55->56 57 146fdbb-146fe5a CreateWindowExW 55->57 56->57 59 146fe63-146fe9b 57->59 60 146fe5c-146fe62 57->60 64 146fe9d-146fea0 59->64 65 146fea8 59->65 60->59 64->65 66 146fea9 65->66 66->66
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0146FE4A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 716092398-0
                                                                                  • Opcode ID: c599eef6475c7519043e3366d9aaef69f6e35c381d14bb34cc541b1c1f59d6f7
                                                                                  • Instruction ID: e941ce205b4f76c815efd384d585567b0c9ae0337be9bbc125abdc46371980e2
                                                                                  • Opcode Fuzzy Hash: c599eef6475c7519043e3366d9aaef69f6e35c381d14bb34cc541b1c1f59d6f7
                                                                                  • Instruction Fuzzy Hash: 7E41CEB1D103089FDF14CF9AD884ADEBFB5BF88314F24812AE819AB210D774A945CF91
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 67 1465364-1465431 CreateActCtxA 69 1465433-1465439 67->69 70 146543a-1465494 67->70 69->70 77 1465496-1465499 70->77 78 14654a3-14654a7 70->78 77->78 79 14654b8 78->79 80 14654a9-14654b5 78->80 81 14654b9 79->81 80->79 81->81
                                                                                  APIs
                                                                                  • CreateActCtxA.KERNEL32(?), ref: 01465421
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create
                                                                                  • String ID:
                                                                                  • API String ID: 2289755597-0
                                                                                  • Opcode ID: 2e0903bb8977727f574100c8d106f571a2f254886cea3ad7fa55a37f2ece8105
                                                                                  • Instruction ID: 095a1753e47283b15fddb39a86e9668a2bd17d5f3faf15e0dd66d2f80c656fcc
                                                                                  • Opcode Fuzzy Hash: 2e0903bb8977727f574100c8d106f571a2f254886cea3ad7fa55a37f2ece8105
                                                                                  • Instruction Fuzzy Hash: F0410470D00628CFDB24CFA9C884BDEBBB5BF88308F14816AD509AB251D7756946CF91
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 83 1463de4-1465431 CreateActCtxA 86 1465433-1465439 83->86 87 146543a-1465494 83->87 86->87 94 1465496-1465499 87->94 95 14654a3-14654a7 87->95 94->95 96 14654b8 95->96 97 14654a9-14654b5 95->97 98 14654b9 96->98 97->96 98->98
                                                                                  APIs
                                                                                  • CreateActCtxA.KERNEL32(?), ref: 01465421
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create
                                                                                  • String ID:
                                                                                  • API String ID: 2289755597-0
                                                                                  • Opcode ID: 061dc5a1f2d1d2772a40892dbf262d94ad38c231047b4873a756287be7b8b9e5
                                                                                  • Instruction ID: b3ff9022220cbb0437ac2085037e063fcc61ccdcb464f7246b178eb4e95a3934
                                                                                  • Opcode Fuzzy Hash: 061dc5a1f2d1d2772a40892dbf262d94ad38c231047b4873a756287be7b8b9e5
                                                                                  • Instruction Fuzzy Hash: E2411270D00728CFDB24CFA9C884B9EBBB5BF88308F20816AD509AB251DB756945CF91
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 100 1467d5a-1467d61 101 1467db6-1467db8 100->101 102 1467d63-1467d72 100->102 103 1467db9 101->103 104 1467d74 102->104 105 1467dc0-1467dc1 102->105 103->105 106 1467d7a-1467d8e 104->106 106->103 107 1467d90-1467da3 call 1467124 106->107 107->103 110 1467da5-1467db2 call 1465188 107->110 110->103 113 1467db4 110->113 113->103
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: MetricsSystem
                                                                                  • String ID:
                                                                                  • API String ID: 4116985748-0
                                                                                  • Opcode ID: ccab11045b12c3ffdd30b472c99fce734216efa114d39bcbfc77fe86ac6ba3ed
                                                                                  • Instruction ID: 5d1958223df4c71e42371a1ebf9689be17abc22829e1adf9616a60d56d299fdd
                                                                                  • Opcode Fuzzy Hash: ccab11045b12c3ffdd30b472c99fce734216efa114d39bcbfc77fe86ac6ba3ed
                                                                                  • Instruction Fuzzy Hash: 5431C6B19053858FD722CFA9D8443EE7FF4EB25219F1844AFC444E72A2C3785945CB62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 114 14698a8-14698ad 115 1469894-146989b 114->115 116 14698af-14698f0 114->116 117 146d498-146d4ba 115->117 118 14698f2-14698f5 116->118 119 14698f8-1469923 GetModuleHandleW 116->119 123 146d4c7-146d4c9 117->123 124 146d4bc-146d4c5 call 146c134 117->124 118->119 121 1469925-146992b 119->121 122 146992c-1469940 119->122 121->122 122->117 126 146d4fb-146d508 call 146c144 123->126 127 146d4cb-146d4d9 123->127 124->123 132 146d509-146d58e call 146aea0 124->132 134 146d4ec-146d4f4 127->134 135 146d4db-146d4ea 127->135 134->126 135->126
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 01469916
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModule
                                                                                  • String ID:
                                                                                  • API String ID: 4139908857-0
                                                                                  • Opcode ID: 30b9c9e21c3076da4522ae940110b58632b94ac9ebd02ed5d3c9c24e28db86f8
                                                                                  • Instruction ID: d9dc1e2aa3e462e92e78cfbea6d0f9e8753f38a650305aa9eca2b76474fa4c39
                                                                                  • Opcode Fuzzy Hash: 30b9c9e21c3076da4522ae940110b58632b94ac9ebd02ed5d3c9c24e28db86f8
                                                                                  • Instruction Fuzzy Hash: 663182B1E002559FDB14DFAAC444AEEBBF9EF89218F14842FD559A7310D7749801CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 147 146b8f2-146b98c DuplicateHandle 148 146b995-146b9b2 147->148 149 146b98e-146b994 147->149 149->148
                                                                                  APIs
                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0146B97F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DuplicateHandle
                                                                                  • String ID:
                                                                                  • API String ID: 3793708945-0
                                                                                  • Opcode ID: 96da94d4c563e7eed42074ad55c040f6c28be36b81fd7efa2f73cd2f47eb2b98
                                                                                  • Instruction ID: 3fce49d5e63072dba2f80583ef5969597fb960c08c19d1818ed3452e0b1c92b0
                                                                                  • Opcode Fuzzy Hash: 96da94d4c563e7eed42074ad55c040f6c28be36b81fd7efa2f73cd2f47eb2b98
                                                                                  • Instruction Fuzzy Hash: E121E5B5D002489FDB10CFA9D484AEEBFF4EB48324F14841AE955B7310D378A945CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 152 146b8f8-146b98c DuplicateHandle 153 146b995-146b9b2 152->153 154 146b98e-146b994 152->154 154->153
                                                                                  APIs
                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0146B97F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DuplicateHandle
                                                                                  • String ID:
                                                                                  • API String ID: 3793708945-0
                                                                                  • Opcode ID: 12cecdf0689e2f4123d2ef0f18b7eb8a7c10b6d3a8dc5a3e119050f8f7406bbe
                                                                                  • Instruction ID: 080b07701512f672828ea004c163c02a016c1ae0316bb9b625a0ca5005253356
                                                                                  • Opcode Fuzzy Hash: 12cecdf0689e2f4123d2ef0f18b7eb8a7c10b6d3a8dc5a3e119050f8f7406bbe
                                                                                  • Instruction Fuzzy Hash: 5821C2B59002589FDB10CFAAD884ADEBFF8EB48324F14841AE955A7310D374A944CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 157 14694b8-1469b78 159 1469b80-1469baf LoadLibraryExW 157->159 160 1469b7a-1469b7d 157->160 161 1469bb1-1469bb7 159->161 162 1469bb8-1469bd5 159->162 160->159 161->162
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01469991,00000800,00000000,00000000), ref: 01469BA2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID:
                                                                                  • API String ID: 1029625771-0
                                                                                  • Opcode ID: c7ae42b699dc0428bda49eeb037da992cc4a94477c8aa142a09c43428e38f425
                                                                                  • Instruction ID: bb957ba2b7e0e8c17a0465ad20cbbbc732a4f6ff2ce692a04841d7482cc492a0
                                                                                  • Opcode Fuzzy Hash: c7ae42b699dc0428bda49eeb037da992cc4a94477c8aa142a09c43428e38f425
                                                                                  • Instruction Fuzzy Hash: 5C1106B29002498FDB10CF9AC444BDEFBF8EB98728F14841EE515A7610C3B5A945CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 165 1469b30-1469b78 166 1469b80-1469baf LoadLibraryExW 165->166 167 1469b7a-1469b7d 165->167 168 1469bb1-1469bb7 166->168 169 1469bb8-1469bd5 166->169 167->166 168->169
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,01469991,00000800,00000000,00000000), ref: 01469BA2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID:
                                                                                  • API String ID: 1029625771-0
                                                                                  • Opcode ID: daf84c43d771e84f6cf76fdf5207f714f8d5011c4400e151675cc2c62c02b755
                                                                                  • Instruction ID: c1a41b98c6a5ac7f065db8920492953180d800f156621d97a6038880d63120ba
                                                                                  • Opcode Fuzzy Hash: daf84c43d771e84f6cf76fdf5207f714f8d5011c4400e151675cc2c62c02b755
                                                                                  • Instruction Fuzzy Hash: AD1106B29002498FDB10CF9AD444ADEBBF4EB88328F14842EE515A7610C375A945CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 172 14698b0-14698f0 173 14698f2-14698f5 172->173 174 14698f8-1469923 GetModuleHandleW 172->174 173->174 175 1469925-146992b 174->175 176 146992c-146d4ba 174->176 175->176 180 146d4c7-146d4c9 176->180 181 146d4bc-146d4c5 call 146c134 176->181 183 146d4fb-146d4ff call 146c144 180->183 184 146d4cb-146d4d9 180->184 181->180 188 146d509-146d58e call 146aea0 181->188 187 146d504-146d508 183->187 190 146d4ec-146d4f4 184->190 191 146d4db-146d4ea 184->191 190->183 191->183
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 01469916
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModule
                                                                                  • String ID:
                                                                                  • API String ID: 4139908857-0
                                                                                  • Opcode ID: 394922d0487a9bfc8103bcc602affa9882818e140e7173f30761eb70886af3ab
                                                                                  • Instruction ID: 08340855f09cb9a908b13f07431a35404156358d93c910966ee90df4b890608e
                                                                                  • Opcode Fuzzy Hash: 394922d0487a9bfc8103bcc602affa9882818e140e7173f30761eb70886af3ab
                                                                                  • Instruction Fuzzy Hash: 5011E0B6D002498FDB14CF9AD444BDEFBF8EB88228F14841AD569B7710D374A545CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 203 7ac82a0-7ac830a PostMessageW 204 7ac830c-7ac8312 203->204 205 7ac8313-7ac8327 203->205 204->205
                                                                                  APIs
                                                                                  • PostMessageW.USER32(?,?,?,?), ref: 07AC82FD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.321567193.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ac0000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost
                                                                                  • String ID:
                                                                                  • API String ID: 410705778-0
                                                                                  • Opcode ID: e0a20385da371756796067b8170beb6c52b97b4281a9ea4251b1a99c5511b400
                                                                                  • Instruction ID: 1610cd55bb009a84884d9c5424a4989f0d853749a9fda9ee2111f61a6aa5a66f
                                                                                  • Opcode Fuzzy Hash: e0a20385da371756796067b8170beb6c52b97b4281a9ea4251b1a99c5511b400
                                                                                  • Instruction Fuzzy Hash: 9711D3B58002499FDB20CF9AD489BDEBBF8FB58324F14841AE555A7600C378A944CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.314829310.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_10fd000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 6f20b7d10235209b44440b62f385aec060bff8303f9edbab335bae88e04aaf9d
                                                                                  • Instruction ID: ac42eae55a29ef1c028a11792b8b21d036c1886f80895da7a62febc55d30018c
                                                                                  • Opcode Fuzzy Hash: 6f20b7d10235209b44440b62f385aec060bff8303f9edbab335bae88e04aaf9d
                                                                                  • Instruction Fuzzy Hash: 222136B1504240DFDB05CF54D8C5B2ABFA1FB88728F2485ADEA454B607C336D845CBA2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.314851206.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_110d000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 373ec03e5411d6775a4fbf1032d27d230eba1a7644db238577d6950437fa10be
                                                                                  • Instruction ID: 3c5518360cbf2d84fc9a89b09d0d2516b7706534f38d57df76ce9714e4e4b3cf
                                                                                  • Opcode Fuzzy Hash: 373ec03e5411d6775a4fbf1032d27d230eba1a7644db238577d6950437fa10be
                                                                                  • Instruction Fuzzy Hash: E62107B1904344EFDF0ADFD4E5C0B26BB65FB88324F24C56DE9094B286C376D846CA62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.314851206.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_110d000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 166fe4a8984ce27c34fcd26d81da2db1c4bdcaa2d432fb43b92ce1819935387f
                                                                                  • Instruction ID: bcd455db73af53d24b2f2c1e1646076810e7bfa9bb2bb4a49d0c8ceeb23f19d4
                                                                                  • Opcode Fuzzy Hash: 166fe4a8984ce27c34fcd26d81da2db1c4bdcaa2d432fb43b92ce1819935387f
                                                                                  • Instruction Fuzzy Hash: 77212871904244DFDF1ACF94E4C4B16BB65FB84354F24C56DD90D4B28AC377D806CA62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.314829310.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_10fd000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f21b28fad4208f8a7773c4da12b744b29c369e0cd12ff14c60c0cef6af4301ee
                                                                                  • Instruction ID: f5ed733584aab7f9139840bffbe5b2d16c53cb185e45f6c4464ce26d83bcf911
                                                                                  • Opcode Fuzzy Hash: f21b28fad4208f8a7773c4da12b744b29c369e0cd12ff14c60c0cef6af4301ee
                                                                                  • Instruction Fuzzy Hash: 7611E172404280CFCB02CF54D5C4B16BFB1FB88724F28C6ADD9450B616C33AD45ACBA2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.314851206.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_110d000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fe9a0dd81ef1aaa8884096262e193c6d7ada8b10660d0bdcffad81c4736878b9
                                                                                  • Instruction ID: 6672ff5ab619791c61714d2ac946dbe1079516d6f579290616cdf436b6c32be3
                                                                                  • Opcode Fuzzy Hash: fe9a0dd81ef1aaa8884096262e193c6d7ada8b10660d0bdcffad81c4736878b9
                                                                                  • Instruction Fuzzy Hash: 1611BE75904280DFCB16CF54E5C4B15BB71FB44324F28C6ADD8494B69AC37AD44ACB62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.314851206.000000000110D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0110D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_110d000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fe9a0dd81ef1aaa8884096262e193c6d7ada8b10660d0bdcffad81c4736878b9
                                                                                  • Instruction ID: 026b3bd1e0cdc2e7c543cb16d8f461cc1d66536148ee27da469edcb437e66ae6
                                                                                  • Opcode Fuzzy Hash: fe9a0dd81ef1aaa8884096262e193c6d7ada8b10660d0bdcffad81c4736878b9
                                                                                  • Instruction Fuzzy Hash: 3911BB75904280DFCF06CF98D5C0B15BBB1FB84224F28C6ADD8494B696C37AD44ACB62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.314829310.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_10fd000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c9c3f6346bfce32efc275618683293a868bb3ec3c15be6446d2af29495a9e1b7
                                                                                  • Instruction ID: 367cf4e447d963329c290ae080a30464630d3edc31b1ecac4ca5e52b4dcbe38d
                                                                                  • Opcode Fuzzy Hash: c9c3f6346bfce32efc275618683293a868bb3ec3c15be6446d2af29495a9e1b7
                                                                                  • Instruction Fuzzy Hash: 8401FC710083C09AE7114A59CCC5B6ABFD8FF41278F08855EEB455F647E3799844C7B1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.314829310.00000000010FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010FD000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_10fd000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e432b7302e7a4e9889390fe85efdf6649779775b80352fa383bb14b13d1e5ed6
                                                                                  • Instruction ID: f54cdfbce5fae8ae7b920c62d4af80a10c6501130c04098ca57e02af8bce779f
                                                                                  • Opcode Fuzzy Hash: e432b7302e7a4e9889390fe85efdf6649779775b80352fa383bb14b13d1e5ed6
                                                                                  • Instruction Fuzzy Hash: 05F0C2714043849AE7618E1ACC84B66FFD8EB81238F18C05EEE485F686D3789844CBB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Strings
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.321567193.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ac0000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID: n
                                                                                  • API String ID: 0-2013832146
                                                                                  • Opcode ID: bfdac1c63e232f5433c838a1ce82c2f4e0de202c95339519bb9eebacf6b16e40
                                                                                  • Instruction ID: 3d524da8c14b807c8c90554cb0e8ac3cfd227530d007d5c2539b11bcb0fe3918
                                                                                  • Opcode Fuzzy Hash: bfdac1c63e232f5433c838a1ce82c2f4e0de202c95339519bb9eebacf6b16e40
                                                                                  • Instruction Fuzzy Hash: 52419171D456588FEB59CF6B9C402CAFBF3AFC9210F18C1BAC848AA225EB3509558F11
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8148c04dfa0640a1d4f3454f28e74647b4528362b30da99d9061eb1ea6124b6f
                                                                                  • Instruction ID: 80ea4c89a7f3eecae09611dbaa4a3cd53724b311f369c71a158dd28fee1f7957
                                                                                  • Opcode Fuzzy Hash: 8148c04dfa0640a1d4f3454f28e74647b4528362b30da99d9061eb1ea6124b6f
                                                                                  • Instruction Fuzzy Hash: 0712A1F54117468BE330DF65E9D818DBBA1F785328B90420DD2A12FAF9D7B8158ACF84
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8dd1aeb658f347bf8f19bee271c7dc1cdc1f18984189b36f74ead7879911f2d8
                                                                                  • Instruction ID: 6d6cefcec1705483f07af0caecb8a9f9dd8a9f7cd1368f976967f5d593713a15
                                                                                  • Opcode Fuzzy Hash: 8dd1aeb658f347bf8f19bee271c7dc1cdc1f18984189b36f74ead7879911f2d8
                                                                                  • Instruction Fuzzy Hash: 0FA19D32E0021A8FCF15DFE5C8849DEBBF6FF94304B15856AE945BB221EB31A905CB41
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.315199558.0000000001460000.00000040.00000800.00020000.00000000.sdmp, Offset: 01460000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_1460000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 327230df34cf2a79e97ab7d58855e2623f343c384fff0b139a7be2075c27bc8b
                                                                                  • Instruction ID: 98985e0cb1e8f3f7e3894c032815f3ace36b0b92ece6baea570c0a5192985469
                                                                                  • Opcode Fuzzy Hash: 327230df34cf2a79e97ab7d58855e2623f343c384fff0b139a7be2075c27bc8b
                                                                                  • Instruction Fuzzy Hash: BEC1F4B18117468BD720DF65E8C818DBBB1FB85328F51421DD2616FAF9D7B8148ACF84
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000000.00000002.321567193.0000000007AC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AC0000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_0_2_7ac0000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 8dcce9c62408cb2f903ea552260bfb32d53761c60b791ff454c4ec77cb16c9c3
                                                                                  • Instruction ID: 2fbb94025fd5efd4e8eae9b727047566aaa96e9c92166ab02db238c952237e42
                                                                                  • Opcode Fuzzy Hash: 8dcce9c62408cb2f903ea552260bfb32d53761c60b791ff454c4ec77cb16c9c3
                                                                                  • Instruction Fuzzy Hash: 8F21DAB2D556299BDB68CF5BD8447E9BAF7ABC9300F04C0FAC42DA6254DB3009858F50
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Execution Graph

                                                                                  Execution Coverage:20.6%
                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                  Signature Coverage:0%
                                                                                  Total number of Nodes:561
                                                                                  Total number of Limit Nodes:17
                                                                                  execution_graph 47713 2904cb0 47714 2904cc4 47713->47714 47717 2905302 47714->47717 47715 2904ccd 47718 290530b 47717->47718 47723 29054e4 47717->47723 47728 29054fe 47717->47728 47733 29053e8 47717->47733 47738 29053d7 47717->47738 47718->47715 47724 2905497 47723->47724 47725 2905523 47724->47725 47743 29057f0 47724->47743 47749 29057df 47724->47749 47729 2905511 47728->47729 47730 2905523 47728->47730 47731 29057f0 3 API calls 47729->47731 47732 29057df 3 API calls 47729->47732 47731->47730 47732->47730 47734 290542c 47733->47734 47735 2905523 47734->47735 47736 29057f0 3 API calls 47734->47736 47737 29057df 3 API calls 47734->47737 47736->47735 47737->47735 47739 290542c 47738->47739 47740 2905523 47739->47740 47741 29057f0 3 API calls 47739->47741 47742 29057df 3 API calls 47739->47742 47741->47740 47742->47740 47744 29057fe 47743->47744 47748 29057df 3 API calls 47744->47748 47758 2905830 47744->47758 47762 2905840 47744->47762 47745 290580e 47745->47725 47748->47745 47750 29057ea 47749->47750 47752 2905855 47749->47752 47755 2905830 RtlEncodePointer 47750->47755 47756 2905840 RtlEncodePointer 47750->47756 47757 29057df 2 API calls 47750->47757 47751 290580e 47751->47725 47753 29058a4 RtlEncodePointer 47752->47753 47754 29058cd 47752->47754 47753->47754 47754->47725 47755->47751 47756->47751 47757->47751 47759 290583e 47758->47759 47760 29058a4 RtlEncodePointer 47759->47760 47761 29058cd 47759->47761 47760->47761 47761->47745 47763 290587a 47762->47763 47764 29058a4 RtlEncodePointer 47763->47764 47765 29058cd 47763->47765 47764->47765 47765->47745 47766 290bbf8 47767 290bc16 47766->47767 47770 290b7d4 47767->47770 47769 290bc4d 47771 290d718 LoadLibraryA 47770->47771 47773 290d7f4 47771->47773 47778 2900448 47779 2900455 47778->47779 47782 2900868 47779->47782 47780 290045b 47783 29007fe 47782->47783 47784 290086b 47782->47784 47783->47780 47784->47783 47785 2900a4f VirtualAllocExNuma 47784->47785 47791 5c662f7 47784->47791 47799 5c66470 47784->47799 47807 2900bd8 47784->47807 47787 2900b15 47785->47787 47787->47780 47793 5c6630d 47791->47793 47792 5c668e3 47792->47784 47793->47792 47812 5c67012 47793->47812 47817 5c67051 47793->47817 47822 5c66ea3 47793->47822 47827 5c67468 47793->47827 47884 5c67478 47793->47884 47800 5c66489 47799->47800 47801 5c668e3 47800->47801 47802 5c67468 53 API calls 47800->47802 47803 5c67478 53 API calls 47800->47803 47804 5c67012 DeleteFileW 47800->47804 47805 5c66ea3 DeleteFileW 47800->47805 47806 5c67051 DeleteFileW 47800->47806 47801->47784 47802->47800 47803->47800 47804->47800 47805->47800 47806->47800 47808 2900b79 Sleep 47807->47808 47811 2900be7 47807->47811 47810 2900bbe 47808->47810 47810->47784 47811->47784 47814 5c67019 47812->47814 47813 5c67170 47813->47793 47940 5c671d0 47814->47940 47945 5c67178 47814->47945 47819 5c67058 47817->47819 47818 5c67170 47818->47793 47820 5c671d0 DeleteFileW 47819->47820 47821 5c67178 DeleteFileW 47819->47821 47820->47818 47821->47818 47824 5c66ead 47822->47824 47823 5c67170 47823->47793 47824->47823 47825 5c671d0 DeleteFileW 47824->47825 47826 5c67178 DeleteFileW 47824->47826 47825->47823 47826->47823 47828 5c67433 47827->47828 47830 5c67473 47827->47830 47828->47793 47829 5c67534 47829->47793 47830->47829 47954 6168236 47830->47954 47959 6168204 47830->47959 47964 5c6851e 47830->47964 47971 5c68a91 47830->47971 47978 5c68791 47830->47978 47985 5c68413 47830->47985 47992 5c688a5 47830->47992 47999 5c67e97 47830->47999 48006 5c68389 47830->48006 48013 5c68308 47830->48013 48020 5c68a01 47830->48020 48027 5c68701 47830->48027 48034 5c680fb 47830->48034 48041 5c6897d 47830->48041 48048 5c681fd 47830->48048 48055 5c6817c 47830->48055 48062 5c68b7f 47830->48062 48067 5c6827e 47830->48067 48074 5c68071 47830->48074 48081 5c68671 47830->48081 48088 5c67ff0 47830->48088 48095 5c67e76 KiUserExceptionDispatcher 47830->48095 48102 5c67fab 47830->48102 48109 5c685e4 47830->48109 48116 5c67f66 47830->48116 48123 5c68ad9 47830->48123 48130 5c684d9 47830->48130 48137 5c68458 47830->48137 48144 5c6855a 47830->48144 48151 5c6885d 47830->48151 48158 5c68815 47830->48158 48165 5c68a49 47830->48165 48172 5c68749 47830->48172 48179 5c687cd 47830->48179 48186 5c683ce 47830->48186 48193 5c681c1 47830->48193 48200 5c68140 47830->48200 48207 5c682c3 47830->48207 48214 5c68035 47830->48214 48221 5c68344 47830->48221 48228 5c68b37 47830->48228 48233 5c680b6 47830->48233 48240 5c67edc 47830->48240 48247 5c689b9 47830->48247 48254 5c686b9 47830->48254 48261 5c68935 47830->48261 48268 5c68242 47830->48268 48275 5c6849d 47830->48275 48282 5c67f21 47830->48282 48289 5c68629 47830->48289 48296 5c688ed 47830->48296 48303 5c6859f 47830->48303 48310 616b120 47830->48310 47886 5c67480 47884->47886 47885 5c67534 47885->47793 47886->47885 47887 616b120 2 API calls 47886->47887 47888 6168236 2 API calls 47886->47888 47889 6168204 2 API calls 47886->47889 47890 5c68344 3 API calls 47886->47890 47891 5c68242 3 API calls 47886->47891 47892 5c682c3 3 API calls 47886->47892 47893 5c68140 3 API calls 47886->47893 47894 5c681c1 3 API calls 47886->47894 47895 5c683ce 3 API calls 47886->47895 47896 5c687cd 3 API calls 47886->47896 47897 5c68749 3 API calls 47886->47897 47898 5c68a49 3 API calls 47886->47898 47899 5c67edc 3 API calls 47886->47899 47900 5c6885d 3 API calls 47886->47900 47901 5c6855a 3 API calls 47886->47901 47902 5c68458 3 API calls 47886->47902 47903 5c684d9 3 API calls 47886->47903 47904 5c68ad9 3 API calls 47886->47904 47905 5c67f66 3 API calls 47886->47905 47906 5c685e4 3 API calls 47886->47906 47907 5c688ed 3 API calls 47886->47907 47908 5c67e76 4 API calls 47886->47908 47909 5c67ff0 3 API calls 47886->47909 47910 5c68671 3 API calls 47886->47910 47911 5c68071 3 API calls 47886->47911 47912 5c6827e 3 API calls 47886->47912 47913 5c68b7f 2 API calls 47886->47913 47914 5c6817c 3 API calls 47886->47914 47915 5c681fd 3 API calls 47886->47915 47916 5c6897d 3 API calls 47886->47916 47917 5c680fb 3 API calls 47886->47917 47918 5c68701 3 API calls 47886->47918 47919 5c68a01 3 API calls 47886->47919 47920 5c68308 3 API calls 47886->47920 47921 5c68389 3 API calls 47886->47921 47922 5c67e97 3 API calls 47886->47922 47923 5c68815 3 API calls 47886->47923 47924 5c68413 3 API calls 47886->47924 47925 5c68791 3 API calls 47886->47925 47926 5c68a91 3 API calls 47886->47926 47927 5c6851e 3 API calls 47886->47927 47928 5c6859f 3 API calls 47886->47928 47929 5c6849d 3 API calls 47886->47929 47930 5c688a5 3 API calls 47886->47930 47931 5c67f21 3 API calls 47886->47931 47932 5c67fab 3 API calls 47886->47932 47933 5c68629 3 API calls 47886->47933 47934 5c680b6 3 API calls 47886->47934 47935 5c68b37 2 API calls 47886->47935 47936 5c68035 3 API calls 47886->47936 47937 5c68935 3 API calls 47886->47937 47938 5c686b9 3 API calls 47886->47938 47939 5c689b9 3 API calls 47886->47939 47887->47886 47888->47886 47889->47886 47890->47886 47891->47886 47892->47886 47893->47886 47894->47886 47895->47886 47896->47886 47897->47886 47898->47886 47899->47886 47900->47886 47901->47886 47902->47886 47903->47886 47904->47886 47905->47886 47906->47886 47907->47886 47908->47886 47909->47886 47910->47886 47911->47886 47912->47886 47913->47886 47914->47886 47915->47886 47916->47886 47917->47886 47918->47886 47919->47886 47920->47886 47921->47886 47922->47886 47923->47886 47924->47886 47925->47886 47926->47886 47927->47886 47928->47886 47929->47886 47930->47886 47931->47886 47932->47886 47933->47886 47934->47886 47935->47886 47936->47886 47937->47886 47938->47886 47939->47886 47941 5c671de 47940->47941 47942 5c67201 47940->47942 47941->47813 47944 5c67255 47942->47944 47950 5c66160 47942->47950 47944->47813 47946 5c67196 47945->47946 47948 5c671b9 47945->47948 47946->47813 47947 5c671de 47947->47813 47948->47947 47949 5c66160 DeleteFileW 47948->47949 47949->47947 47951 5c672c8 DeleteFileW 47950->47951 47953 5c67347 47951->47953 47953->47944 47955 6168245 47954->47955 48314 6168738 47955->48314 48319 6168728 47955->48319 47956 616824d 47956->47830 47960 616820e 47959->47960 47961 616824d 47960->47961 47962 6168738 2 API calls 47960->47962 47963 6168728 2 API calls 47960->47963 47961->47830 47962->47961 47963->47961 47965 5c6852f 47964->47965 47966 5c68b00 KiUserExceptionDispatcher 47965->47966 47967 5c68b1c 47966->47967 48353 61677f8 47967->48353 48358 6167808 47967->48358 47968 5c68bac 47968->47830 47972 5c68aa2 47971->47972 47973 5c68b00 KiUserExceptionDispatcher 47972->47973 47974 5c68b1c 47973->47974 47976 61677f8 2 API calls 47974->47976 47977 6167808 2 API calls 47974->47977 47975 5c68bac 47975->47830 47976->47975 47977->47975 47979 5c687a2 47978->47979 47980 5c68b00 KiUserExceptionDispatcher 47979->47980 47981 5c68b1c 47980->47981 47983 61677f8 2 API calls 47981->47983 47984 6167808 2 API calls 47981->47984 47982 5c68bac 47982->47830 47983->47982 47984->47982 47986 5c68424 47985->47986 47987 5c68b00 KiUserExceptionDispatcher 47986->47987 47988 5c68b1c 47987->47988 47990 61677f8 2 API calls 47988->47990 47991 6167808 2 API calls 47988->47991 47989 5c68bac 47989->47830 47990->47989 47991->47989 47993 5c688b6 47992->47993 47994 5c68b00 KiUserExceptionDispatcher 47993->47994 47995 5c68b1c 47994->47995 47997 61677f8 2 API calls 47995->47997 47998 6167808 2 API calls 47995->47998 47996 5c68bac 47996->47830 47997->47996 47998->47996 48000 5c67ea8 47999->48000 48001 5c68b00 KiUserExceptionDispatcher 48000->48001 48002 5c68b1c 48001->48002 48004 61677f8 2 API calls 48002->48004 48005 6167808 2 API calls 48002->48005 48003 5c68bac 48003->47830 48004->48003 48005->48003 48007 5c6839a 48006->48007 48008 5c68b00 KiUserExceptionDispatcher 48007->48008 48009 5c68b1c 48008->48009 48011 61677f8 2 API calls 48009->48011 48012 6167808 2 API calls 48009->48012 48010 5c68bac 48010->47830 48011->48010 48012->48010 48014 5c68319 48013->48014 48015 5c68b00 KiUserExceptionDispatcher 48014->48015 48016 5c68b1c 48015->48016 48018 61677f8 2 API calls 48016->48018 48019 6167808 2 API calls 48016->48019 48017 5c68bac 48017->47830 48018->48017 48019->48017 48021 5c68a12 48020->48021 48022 5c68b00 KiUserExceptionDispatcher 48021->48022 48023 5c68b1c 48022->48023 48025 61677f8 2 API calls 48023->48025 48026 6167808 2 API calls 48023->48026 48024 5c68bac 48024->47830 48025->48024 48026->48024 48028 5c68712 48027->48028 48029 5c68b00 KiUserExceptionDispatcher 48028->48029 48030 5c68b1c 48029->48030 48032 61677f8 2 API calls 48030->48032 48033 6167808 2 API calls 48030->48033 48031 5c68bac 48031->47830 48032->48031 48033->48031 48035 5c6810c 48034->48035 48036 5c68b00 KiUserExceptionDispatcher 48035->48036 48037 5c68b1c 48036->48037 48039 61677f8 2 API calls 48037->48039 48040 6167808 2 API calls 48037->48040 48038 5c68bac 48038->47830 48039->48038 48040->48038 48042 5c6898e 48041->48042 48043 5c68b00 KiUserExceptionDispatcher 48042->48043 48044 5c68b1c 48043->48044 48046 61677f8 2 API calls 48044->48046 48047 6167808 2 API calls 48044->48047 48045 5c68bac 48045->47830 48046->48045 48047->48045 48049 5c6820e 48048->48049 48050 5c68b00 KiUserExceptionDispatcher 48049->48050 48051 5c68b1c 48050->48051 48053 61677f8 2 API calls 48051->48053 48054 6167808 2 API calls 48051->48054 48052 5c68bac 48052->47830 48053->48052 48054->48052 48056 5c6818d 48055->48056 48057 5c68b00 KiUserExceptionDispatcher 48056->48057 48058 5c68b1c 48057->48058 48060 61677f8 2 API calls 48058->48060 48061 6167808 2 API calls 48058->48061 48059 5c68bac 48059->47830 48060->48059 48061->48059 48063 5c68b90 48062->48063 48065 61677f8 2 API calls 48063->48065 48066 6167808 2 API calls 48063->48066 48064 5c68bac 48064->47830 48065->48064 48066->48064 48068 5c6828f 48067->48068 48069 5c68b00 KiUserExceptionDispatcher 48068->48069 48070 5c68b1c 48069->48070 48072 61677f8 2 API calls 48070->48072 48073 6167808 2 API calls 48070->48073 48071 5c68bac 48071->47830 48072->48071 48073->48071 48075 5c68082 48074->48075 48076 5c68b00 KiUserExceptionDispatcher 48075->48076 48077 5c68b1c 48076->48077 48079 61677f8 2 API calls 48077->48079 48080 6167808 2 API calls 48077->48080 48078 5c68bac 48078->47830 48079->48078 48080->48078 48082 5c68682 48081->48082 48083 5c68b00 KiUserExceptionDispatcher 48082->48083 48084 5c68b1c 48083->48084 48086 61677f8 2 API calls 48084->48086 48087 6167808 2 API calls 48084->48087 48085 5c68bac 48085->47830 48086->48085 48087->48085 48089 5c68001 48088->48089 48090 5c68b00 KiUserExceptionDispatcher 48089->48090 48091 5c68b1c 48090->48091 48093 61677f8 2 API calls 48091->48093 48094 6167808 2 API calls 48091->48094 48092 5c68bac 48092->47830 48093->48092 48094->48092 48096 5c67e95 48095->48096 48097 5c68b00 KiUserExceptionDispatcher 48096->48097 48098 5c68b1c 48097->48098 48100 61677f8 2 API calls 48098->48100 48101 6167808 2 API calls 48098->48101 48099 5c68bac 48099->47830 48100->48099 48101->48099 48103 5c67fbc 48102->48103 48104 5c68b00 KiUserExceptionDispatcher 48103->48104 48105 5c68b1c 48104->48105 48107 61677f8 2 API calls 48105->48107 48108 6167808 2 API calls 48105->48108 48106 5c68bac 48106->47830 48107->48106 48108->48106 48110 5c685f5 48109->48110 48111 5c68b00 KiUserExceptionDispatcher 48110->48111 48112 5c68b1c 48111->48112 48114 61677f8 2 API calls 48112->48114 48115 6167808 2 API calls 48112->48115 48113 5c68bac 48113->47830 48114->48113 48115->48113 48117 5c67f77 48116->48117 48118 5c68b00 KiUserExceptionDispatcher 48117->48118 48119 5c68b1c 48118->48119 48121 61677f8 2 API calls 48119->48121 48122 6167808 2 API calls 48119->48122 48120 5c68bac 48120->47830 48121->48120 48122->48120 48124 5c68aea KiUserExceptionDispatcher 48123->48124 48126 5c68b1c 48124->48126 48128 61677f8 2 API calls 48126->48128 48129 6167808 2 API calls 48126->48129 48127 5c68bac 48127->47830 48128->48127 48129->48127 48131 5c684ea 48130->48131 48132 5c68b00 KiUserExceptionDispatcher 48131->48132 48133 5c68b1c 48132->48133 48135 61677f8 2 API calls 48133->48135 48136 6167808 2 API calls 48133->48136 48134 5c68bac 48134->47830 48135->48134 48136->48134 48138 5c68469 48137->48138 48139 5c68b00 KiUserExceptionDispatcher 48138->48139 48140 5c68b1c 48139->48140 48142 61677f8 2 API calls 48140->48142 48143 6167808 2 API calls 48140->48143 48141 5c68bac 48141->47830 48142->48141 48143->48141 48145 5c6856b 48144->48145 48146 5c68b00 KiUserExceptionDispatcher 48145->48146 48147 5c68b1c 48146->48147 48149 61677f8 2 API calls 48147->48149 48150 6167808 2 API calls 48147->48150 48148 5c68bac 48148->47830 48149->48148 48150->48148 48152 5c6886e 48151->48152 48153 5c68b00 KiUserExceptionDispatcher 48152->48153 48154 5c68b1c 48153->48154 48156 61677f8 2 API calls 48154->48156 48157 6167808 2 API calls 48154->48157 48155 5c68bac 48155->47830 48156->48155 48157->48155 48159 5c68826 48158->48159 48160 5c68b00 KiUserExceptionDispatcher 48159->48160 48161 5c68b1c 48160->48161 48163 61677f8 2 API calls 48161->48163 48164 6167808 2 API calls 48161->48164 48162 5c68bac 48162->47830 48163->48162 48164->48162 48166 5c68a5a 48165->48166 48167 5c68b00 KiUserExceptionDispatcher 48166->48167 48168 5c68b1c 48167->48168 48170 61677f8 2 API calls 48168->48170 48171 6167808 2 API calls 48168->48171 48169 5c68bac 48169->47830 48170->48169 48171->48169 48173 5c6875a 48172->48173 48174 5c68b00 KiUserExceptionDispatcher 48173->48174 48175 5c68b1c 48174->48175 48177 61677f8 2 API calls 48175->48177 48178 6167808 2 API calls 48175->48178 48176 5c68bac 48176->47830 48177->48176 48178->48176 48180 5c687de 48179->48180 48181 5c68b00 KiUserExceptionDispatcher 48180->48181 48182 5c68b1c 48181->48182 48184 61677f8 2 API calls 48182->48184 48185 6167808 2 API calls 48182->48185 48183 5c68bac 48183->47830 48184->48183 48185->48183 48187 5c683df 48186->48187 48188 5c68b00 KiUserExceptionDispatcher 48187->48188 48189 5c68b1c 48188->48189 48191 61677f8 2 API calls 48189->48191 48192 6167808 2 API calls 48189->48192 48190 5c68bac 48190->47830 48191->48190 48192->48190 48194 5c681d2 48193->48194 48195 5c68b00 KiUserExceptionDispatcher 48194->48195 48196 5c68b1c 48195->48196 48198 61677f8 2 API calls 48196->48198 48199 6167808 2 API calls 48196->48199 48197 5c68bac 48197->47830 48198->48197 48199->48197 48201 5c68151 48200->48201 48202 5c68b00 KiUserExceptionDispatcher 48201->48202 48203 5c68b1c 48202->48203 48205 61677f8 2 API calls 48203->48205 48206 6167808 2 API calls 48203->48206 48204 5c68bac 48204->47830 48205->48204 48206->48204 48208 5c682d4 48207->48208 48209 5c68b00 KiUserExceptionDispatcher 48208->48209 48210 5c68b1c 48209->48210 48212 61677f8 2 API calls 48210->48212 48213 6167808 2 API calls 48210->48213 48211 5c68bac 48211->47830 48212->48211 48213->48211 48215 5c68046 48214->48215 48216 5c68b00 KiUserExceptionDispatcher 48215->48216 48217 5c68b1c 48216->48217 48219 61677f8 2 API calls 48217->48219 48220 6167808 2 API calls 48217->48220 48218 5c68bac 48218->47830 48219->48218 48220->48218 48222 5c68355 48221->48222 48223 5c68b00 KiUserExceptionDispatcher 48222->48223 48224 5c68b1c 48223->48224 48226 61677f8 2 API calls 48224->48226 48227 6167808 2 API calls 48224->48227 48225 5c68bac 48225->47830 48226->48225 48227->48225 48229 5c68b48 48228->48229 48231 61677f8 2 API calls 48229->48231 48232 6167808 2 API calls 48229->48232 48230 5c68bac 48230->47830 48231->48230 48232->48230 48234 5c680c7 48233->48234 48235 5c68b00 KiUserExceptionDispatcher 48234->48235 48236 5c68b1c 48235->48236 48238 61677f8 2 API calls 48236->48238 48239 6167808 2 API calls 48236->48239 48237 5c68bac 48237->47830 48238->48237 48239->48237 48241 5c67eed 48240->48241 48242 5c68b00 KiUserExceptionDispatcher 48241->48242 48243 5c68b1c 48242->48243 48245 61677f8 2 API calls 48243->48245 48246 6167808 2 API calls 48243->48246 48244 5c68bac 48244->47830 48245->48244 48246->48244 48248 5c689ca 48247->48248 48249 5c68b00 KiUserExceptionDispatcher 48248->48249 48250 5c68b1c 48249->48250 48252 61677f8 2 API calls 48250->48252 48253 6167808 2 API calls 48250->48253 48251 5c68bac 48251->47830 48252->48251 48253->48251 48255 5c686ca 48254->48255 48256 5c68b00 KiUserExceptionDispatcher 48255->48256 48257 5c68b1c 48256->48257 48259 61677f8 2 API calls 48257->48259 48260 6167808 2 API calls 48257->48260 48258 5c68bac 48258->47830 48259->48258 48260->48258 48262 5c68946 48261->48262 48263 5c68b00 KiUserExceptionDispatcher 48262->48263 48264 5c68b1c 48263->48264 48266 61677f8 2 API calls 48264->48266 48267 6167808 2 API calls 48264->48267 48265 5c68bac 48265->47830 48266->48265 48267->48265 48269 5c68253 48268->48269 48270 5c68b00 KiUserExceptionDispatcher 48269->48270 48271 5c68b1c 48270->48271 48273 61677f8 2 API calls 48271->48273 48274 6167808 2 API calls 48271->48274 48272 5c68bac 48272->47830 48273->48272 48274->48272 48276 5c684ae 48275->48276 48277 5c68b00 KiUserExceptionDispatcher 48276->48277 48278 5c68b1c 48277->48278 48280 61677f8 2 API calls 48278->48280 48281 6167808 2 API calls 48278->48281 48279 5c68bac 48279->47830 48280->48279 48281->48279 48283 5c67f32 48282->48283 48284 5c68b00 KiUserExceptionDispatcher 48283->48284 48285 5c68b1c 48284->48285 48287 61677f8 2 API calls 48285->48287 48288 6167808 2 API calls 48285->48288 48286 5c68bac 48286->47830 48287->48286 48288->48286 48290 5c6863a 48289->48290 48291 5c68b00 KiUserExceptionDispatcher 48290->48291 48292 5c68b1c 48291->48292 48294 61677f8 2 API calls 48292->48294 48295 6167808 2 API calls 48292->48295 48293 5c68bac 48293->47830 48294->48293 48295->48293 48297 5c688fe 48296->48297 48298 5c68b00 KiUserExceptionDispatcher 48297->48298 48299 5c68b1c 48298->48299 48301 61677f8 2 API calls 48299->48301 48302 6167808 2 API calls 48299->48302 48300 5c68bac 48300->47830 48301->48300 48302->48300 48304 5c685b0 48303->48304 48305 5c68b00 KiUserExceptionDispatcher 48304->48305 48306 5c68b1c 48305->48306 48308 61677f8 2 API calls 48306->48308 48309 6167808 2 API calls 48306->48309 48307 5c68bac 48307->47830 48308->48307 48309->48307 48311 616b13b 48310->48311 48312 6168738 2 API calls 48311->48312 48313 616b15f 48311->48313 48312->48313 48313->47830 48315 616874d 48314->48315 48316 6168a28 48315->48316 48317 6169e98 GlobalMemoryStatusEx GlobalMemoryStatusEx 48315->48317 48324 6168fe0 48315->48324 48316->47956 48317->48315 48320 616874d 48319->48320 48321 6168a28 48320->48321 48322 6168fe0 2 API calls 48320->48322 48323 6169e98 GlobalMemoryStatusEx GlobalMemoryStatusEx 48320->48323 48321->47956 48322->48320 48323->48320 48327 61690a8 48324->48327 48328 61690bc 48327->48328 48330 6169007 48327->48330 48331 61690a8 2 API calls 48328->48331 48329 61690d2 48333 6169e98 48329->48333 48330->48315 48331->48329 48334 6169ea3 48333->48334 48336 6169ecb 48333->48336 48334->48330 48335 6169f21 48335->48330 48336->48335 48337 6169fbf 48336->48337 48339 6169fcd 48336->48339 48338 6168fe0 2 API calls 48337->48338 48340 6169fc6 48338->48340 48339->48340 48342 616a398 48339->48342 48340->48330 48345 616a3d0 48342->48345 48343 616a3a6 48343->48340 48346 616a405 48345->48346 48347 616a3dd 48345->48347 48348 6168d60 GlobalMemoryStatusEx 48346->48348 48347->48343 48349 616a422 48348->48349 48350 616a426 48349->48350 48351 616a4ee GlobalMemoryStatusEx 48349->48351 48350->48343 48352 616a51e 48351->48352 48352->48343 48357 6167806 48353->48357 48354 6167a90 48354->47968 48356 6164938 RegQueryValueExW 48356->48357 48357->48354 48357->48356 48363 616492c 48357->48363 48362 6167827 48358->48362 48359 6167a90 48359->47968 48360 616492c RegOpenKeyExW 48360->48362 48361 6164938 RegQueryValueExW 48361->48362 48362->48359 48362->48360 48362->48361 48364 6167b18 RegOpenKeyExW 48363->48364 48366 6167bde 48364->48366 47774 6167278 47775 6167297 LdrInitializeThunk 47774->47775 47777 61672e8 47775->47777
                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.586695035.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_6130000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: e7539231ab6fb2c8634eb61d2fcc803d92fe6546cb3c57c0840d25d2378f5744
                                                                                  • Instruction ID: 0f8fd74084a0c1f5e1a7b3ce22881e2cace70023252733fc4d900899eb5b4cf1
                                                                                  • Opcode Fuzzy Hash: e7539231ab6fb2c8634eb61d2fcc803d92fe6546cb3c57c0840d25d2378f5744
                                                                                  • Instruction Fuzzy Hash: 1C229B30E042158FDB54DBB4D8987AEBBF2AF89718F158829E406EB390DB35DC45CB91
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C67E76
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 8f001f6d63a689dde90281fdef149a488b810f03b95de50055462eb66b3e9253
                                                                                  • Instruction ID: ce288f3c7be27362460257aac207c6fcc32f109b85a8287ba0e077964b125da1
                                                                                  • Opcode Fuzzy Hash: 8f001f6d63a689dde90281fdef149a488b810f03b95de50055462eb66b3e9253
                                                                                  • Instruction Fuzzy Hash: D812A434906218CFCB64DFA4D888B9CB7B2FF4934AF1045E9E45A62340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: bfb0727b873abe06e89d26c8b4b0cb9ada3c68067bcca34b03cc5b15c8f21c93
                                                                                  • Instruction ID: 3a5a3fbac64d51aac42f8460f5b69c2428575b820d59b5672348e8b76f5fc8bf
                                                                                  • Opcode Fuzzy Hash: bfb0727b873abe06e89d26c8b4b0cb9ada3c68067bcca34b03cc5b15c8f21c93
                                                                                  • Instruction Fuzzy Hash: B312A474906218CFCB64DFA5D888B9CB7B2FF4934AF1045E9D45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: ce3c23103b4bc57d217ead1dfb5ccf8bad715e22e1d7bc901f64b78f82c84814
                                                                                  • Instruction ID: 08efa260558bf8b3858db5101c5b3545e8231492b31613196951b1ebff63d74e
                                                                                  • Opcode Fuzzy Hash: ce3c23103b4bc57d217ead1dfb5ccf8bad715e22e1d7bc901f64b78f82c84814
                                                                                  • Instruction Fuzzy Hash: 3002A574906218CFCB64DFA4D888B9CB7B2FF49349F1045E9E45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: b3e704d714618d9cf164ac8cd1d324f1ee1429922c7ad8d7f03832a0b3593c62
                                                                                  • Instruction ID: b7e01d769ba9d899693549b7b10fe2eefe256552a15e02f47a7ee781b19a6496
                                                                                  • Opcode Fuzzy Hash: b3e704d714618d9cf164ac8cd1d324f1ee1429922c7ad8d7f03832a0b3593c62
                                                                                  • Instruction Fuzzy Hash: 9B02A574906218CFCB64DFA4D888B9CB7B2FF49349F1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: f44ab00a0139a014a575eea092418a807af0c583e33d2b466bc3059b66bcc517
                                                                                  • Instruction ID: d8132e537cf30ed7239675f76a933fa7b7a3433a18ecfca2918ddb704a3ffcde
                                                                                  • Opcode Fuzzy Hash: f44ab00a0139a014a575eea092418a807af0c583e33d2b466bc3059b66bcc517
                                                                                  • Instruction Fuzzy Hash: 3002A474906218CFCB64DFA4D888B9CB7B2FF49349F1045E9E45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 99ea21ed5e71a49dab17237364eb32d3818714b77dba4e900a552975de43009c
                                                                                  • Instruction ID: 6b201cef27d5e147f5d6ef23a31a9b427c7f1a6987f11a875974f6a7d904bf6c
                                                                                  • Opcode Fuzzy Hash: 99ea21ed5e71a49dab17237364eb32d3818714b77dba4e900a552975de43009c
                                                                                  • Instruction Fuzzy Hash: E102A434906218CFCB64DFA5D888B9CB7B2BF49349F1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 8b2a832eeb6d6c78408db5eccbeef5bc284bcd4e42959d46f9e2eaec55f35d45
                                                                                  • Instruction ID: b3c8cdf3cc33e8990213579f433792f644551bbb253fe5129681031a64bbc575
                                                                                  • Opcode Fuzzy Hash: 8b2a832eeb6d6c78408db5eccbeef5bc284bcd4e42959d46f9e2eaec55f35d45
                                                                                  • Instruction Fuzzy Hash: 7B02A474906218CFCB64DFA5D888B9CB7B2FF49349F1045E9E45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 706d00b118b457fdff604b0b8cc82090494b86e3c818de5b3b1098d9eb35c543
                                                                                  • Instruction ID: a0c652c9284bc411e4c4c01d8a27a49f8dd7d53ac3963c22138db0722281fade
                                                                                  • Opcode Fuzzy Hash: 706d00b118b457fdff604b0b8cc82090494b86e3c818de5b3b1098d9eb35c543
                                                                                  • Instruction Fuzzy Hash: 35F19434906218CFCB64DFA5D888B9CB7B2FF49349F1045E9D45A62350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: e7a633c0fe27eb4560564c53ddccc34a72d7d4275d1501f4c7753a60b5a81a81
                                                                                  • Instruction ID: 08b4ec4dac819d2a601ae27e5081c1ab854f680a5ea61cdd95acea36443d06dd
                                                                                  • Opcode Fuzzy Hash: e7a633c0fe27eb4560564c53ddccc34a72d7d4275d1501f4c7753a60b5a81a81
                                                                                  • Instruction Fuzzy Hash: ACF1A434906218CFCB64DFA5D888B9CB7B2FF49349F1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: e2ab862979c785ec37a9ec0d138fcbc5d1d1320dc487cca72f101f64951bfef1
                                                                                  • Instruction ID: ce44008d89af656b6b0959d9bd619023aa336b224b1bbcbc0c63466b7db22063
                                                                                  • Opcode Fuzzy Hash: e2ab862979c785ec37a9ec0d138fcbc5d1d1320dc487cca72f101f64951bfef1
                                                                                  • Instruction Fuzzy Hash: CAF19434906218CFCB64DFA5D888B9CB7B2BF49349F1045E9E45AA2350DB359EC1CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 114bc65d30d7ed893b9b611d3fa57907246e56bc6df623c0124921cfbfec1f55
                                                                                  • Instruction ID: bae910f2cb50281f2996b3a2224023e1001e87c48e6e1c847487a16bc4b0d408
                                                                                  • Opcode Fuzzy Hash: 114bc65d30d7ed893b9b611d3fa57907246e56bc6df623c0124921cfbfec1f55
                                                                                  • Instruction Fuzzy Hash: 71F19434906218CFCB64DFA5D888B9CB7B2FF49349F1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 47b225b04052fee7cf15ff0849b5a8c12d020ce67ec7fa48377b208b0830fb2f
                                                                                  • Instruction ID: 8fb8207683df57bdd8d3b6a949de3300865aa947924b719be21060628601fd4a
                                                                                  • Opcode Fuzzy Hash: 47b225b04052fee7cf15ff0849b5a8c12d020ce67ec7fa48377b208b0830fb2f
                                                                                  • Instruction Fuzzy Hash: A8E19434906218CFCB64DFA5D88879CB7B2FF4934AF1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 9468f7556b1a62af00340fce0f282f15ab16739df41b0e4bc1f2cf14ad8b4f06
                                                                                  • Instruction ID: 9fa362034f9b8058aaa99fef4aa906a8a4207fb2eb37d30ac607532592644361
                                                                                  • Opcode Fuzzy Hash: 9468f7556b1a62af00340fce0f282f15ab16739df41b0e4bc1f2cf14ad8b4f06
                                                                                  • Instruction Fuzzy Hash: 96E19434906218CFCB64DFA5D88879CB7B2FF49349F1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 918d6261a9b743b0c2c6246d7201c76c64296f39279fde8f7861deed37a7e24b
                                                                                  • Instruction ID: 6d7ec4bcdaf69d89a4580a2cbc6c9b8c61ffa317fab15210ff567a83aebeba9d
                                                                                  • Opcode Fuzzy Hash: 918d6261a9b743b0c2c6246d7201c76c64296f39279fde8f7861deed37a7e24b
                                                                                  • Instruction Fuzzy Hash: 19E19434906218CFCB64DFA5D88879CB7B2FF4934AF1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 5f0de1999d0b4f1358fe9ef377adb5f1430976fe96ea2f4bd4a076900ab6878c
                                                                                  • Instruction ID: ab54b3725bb9f9d29515b9a0742fc47a3c2fa589358b8181c3b560f1b0f06452
                                                                                  • Opcode Fuzzy Hash: 5f0de1999d0b4f1358fe9ef377adb5f1430976fe96ea2f4bd4a076900ab6878c
                                                                                  • Instruction Fuzzy Hash: F3E19434906218CFCB64DFA5D88879CB7B2FF4934AF1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 02900B06
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocNumaVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 4233825816-0
                                                                                  • Opcode ID: d1e9a7f4f2cf5424743d26bc49d669ab35de565e1c4a112686b10e3de93c785b
                                                                                  • Instruction ID: c1884e3574b1813ddb6dcd9b3375df257f2493d7cdcb97c7a3f0c820d3b58f8f
                                                                                  • Opcode Fuzzy Hash: d1e9a7f4f2cf5424743d26bc49d669ab35de565e1c4a112686b10e3de93c785b
                                                                                  • Instruction Fuzzy Hash: 8E81F071E042088FDF20CBA9D8C47EDBBB4EF89324F11486AE419E7291D7359C56CB91
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: b8a21b4078d97053ed77ffbd64a10cc67088b9e3234aa7c931c120005bf7ab23
                                                                                  • Instruction ID: 0a6cc702c4cd350d0b4b696d058e9d6a1b3b44fb51ef6a94854c3ca8286d9d11
                                                                                  • Opcode Fuzzy Hash: b8a21b4078d97053ed77ffbd64a10cc67088b9e3234aa7c931c120005bf7ab23
                                                                                  • Instruction Fuzzy Hash: 5FD19434906218CFCB64DFA5D88879CB7B2FF4934AF1045E9E45AA2350DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 53dbf8e6fc698f22c14d3b8b7dc68f1c47413cf0481537894c3d30c9db655bec
                                                                                  • Instruction ID: f296e09d23f80648da9e4cc5f9270d6355d28be40a6f9d7c385880d058e0190c
                                                                                  • Opcode Fuzzy Hash: 53dbf8e6fc698f22c14d3b8b7dc68f1c47413cf0481537894c3d30c9db655bec
                                                                                  • Instruction Fuzzy Hash: 3DD1A534906218CFCB64DFA5D88879CB7B2FF4934AF1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 1f78f5a7731530de409f4083fb26758bad41c4f003a02f647f413e17bcef7b45
                                                                                  • Instruction ID: 41313f4173f09ad74e2267903e6c2f357b3ce8893fe793b0319ee69205d02cba
                                                                                  • Opcode Fuzzy Hash: 1f78f5a7731530de409f4083fb26758bad41c4f003a02f647f413e17bcef7b45
                                                                                  • Instruction Fuzzy Hash: 1DD1A434906218CFCB64DFA4D88879CB7B2FF4934AF1045E9E45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 109475346c981c0cacc43d0929666a83d8c450e8760ca3f8c0247f57a2177bdc
                                                                                  • Instruction ID: 00d9a549ee8377d240b7e55110444e6d8cc19e9fe35a12239de10597ffb2bd04
                                                                                  • Opcode Fuzzy Hash: 109475346c981c0cacc43d0929666a83d8c450e8760ca3f8c0247f57a2177bdc
                                                                                  • Instruction Fuzzy Hash: F0C1A434906218CFCB64DFA4D888B9CB7B2FF4934AF1045E9E45AA2340DB355E85CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: a80ff6ef31146f4afa22adb8a495dc66e1ff0f3fb3b138e12266536a530fe5f0
                                                                                  • Instruction ID: ef86ec342a8787612509781cde40bd3571e942f8f826b926210981e7c9409b52
                                                                                  • Opcode Fuzzy Hash: a80ff6ef31146f4afa22adb8a495dc66e1ff0f3fb3b138e12266536a530fe5f0
                                                                                  • Instruction Fuzzy Hash: DBC19534906218CFCB64DFA4D88879CB7B2FF49349F1045E9D55AA2340DB355E85CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 546ec95c8a006a14d4da1d88b46dbef8661dcb557fffe8c768bdd75fb9e9f794
                                                                                  • Instruction ID: 178410671081909ad45d1f70cda244dfbe2d10b28bf32f106cfcfcad183f94f1
                                                                                  • Opcode Fuzzy Hash: 546ec95c8a006a14d4da1d88b46dbef8661dcb557fffe8c768bdd75fb9e9f794
                                                                                  • Instruction Fuzzy Hash: 43C1A534906218CFCB64DFA4D88879CB7B2FF4934AF1045E9D45AA2340DB359E85CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: afdaac6e41be323e3d13a3b6196d22970e69aee882d852f940055ee220d40974
                                                                                  • Instruction ID: a237f7e47f1811ab5def0a007544fe2e6cb67c5e5e64c2453fc005cea49d9338
                                                                                  • Opcode Fuzzy Hash: afdaac6e41be323e3d13a3b6196d22970e69aee882d852f940055ee220d40974
                                                                                  • Instruction Fuzzy Hash: 34B1A534906218CFCB64DFA4D88879CB7B2FF4934AF1045D9D45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: f1ba35c8b49046ac6038e9f78715d9248954eff5bc2b040bbc1493ab561dcc72
                                                                                  • Instruction ID: d4f4af6c95e1068c70afde1eea6f8113a7da6eab1b6a70b7bf8ac252ca911894
                                                                                  • Opcode Fuzzy Hash: f1ba35c8b49046ac6038e9f78715d9248954eff5bc2b040bbc1493ab561dcc72
                                                                                  • Instruction Fuzzy Hash: BEB1B534906218CFCB64DFA4D88CB9CB7B2BF4934AF1045D9E45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 0a37d8fe40168fd3baf0e3429cce27b944333dce8ab3a2e257f1d7b214c8d5e9
                                                                                  • Instruction ID: f0ad47c86d495be6eb8521ddc5fe5d586576f79d5a63975385dc11ed4df4cb51
                                                                                  • Opcode Fuzzy Hash: 0a37d8fe40168fd3baf0e3429cce27b944333dce8ab3a2e257f1d7b214c8d5e9
                                                                                  • Instruction Fuzzy Hash: 14B1A674906228CFCB64DFA4D88CB9CB7B2BF4934AF1045D9D45AA2340DB359E85CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: c9419addffb229bdb4296ff6deb4b389358ae7abe30aabd5ba7bd2c17192ae6c
                                                                                  • Instruction ID: ad284f81474f28f85dab4e87bc9951ccebc48fd234bdc1305113d0114e25fb53
                                                                                  • Opcode Fuzzy Hash: c9419addffb229bdb4296ff6deb4b389358ae7abe30aabd5ba7bd2c17192ae6c
                                                                                  • Instruction Fuzzy Hash: 35A1B534906218CFCB64DFA4D88CB9CB7B2BF4934AF1045E9D45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 4ccb6fd6bf1600b6862702c5ff4e08b7ed53993adc52f7ed5c1196f7bd8cf2cf
                                                                                  • Instruction ID: 23e39032b15193299059e80b13900e3d4bc2e5af28c0de1cc4639e535ec1db84
                                                                                  • Opcode Fuzzy Hash: 4ccb6fd6bf1600b6862702c5ff4e08b7ed53993adc52f7ed5c1196f7bd8cf2cf
                                                                                  • Instruction Fuzzy Hash: 3FA1A474906218CFCB64DFA5D88CB9CB7B2BF49349F1045E9D45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 110b309a1c9926cc0aece1bcfa17f9c79c30ef154ebf57cea668621a741c7b67
                                                                                  • Instruction ID: c990ff4b549e6f1761af8da1739b0aae98010dd47966cb02b52cb0416e388d6f
                                                                                  • Opcode Fuzzy Hash: 110b309a1c9926cc0aece1bcfa17f9c79c30ef154ebf57cea668621a741c7b67
                                                                                  • Instruction Fuzzy Hash: 4291A534906218CFCB64DFA5D88CB9CB7B2BF49349F1045E9D45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 2209aa5d565bc967c8a5a450c7d4c9be7bbfe39a3a1e0abf519473b5bde9a342
                                                                                  • Instruction ID: 725f8e083e666f352657411873bb57d6f665fc8ba8da6f5f010c1587cd4b59c2
                                                                                  • Opcode Fuzzy Hash: 2209aa5d565bc967c8a5a450c7d4c9be7bbfe39a3a1e0abf519473b5bde9a342
                                                                                  • Instruction Fuzzy Hash: A091A534906218CFCB64DFA5D888B9CBBB2BF49349F1045E9D45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 3db66112c31dbd79e225b1216732898afd859c43ba79c54341b0304b41e38f9d
                                                                                  • Instruction ID: 36af0b25f1aae82636bf36c7830b5809009790099379c69a5bf5a09283cc230c
                                                                                  • Opcode Fuzzy Hash: 3db66112c31dbd79e225b1216732898afd859c43ba79c54341b0304b41e38f9d
                                                                                  • Instruction Fuzzy Hash: 0991A634906218CFCB64DFA5D88C79CB7B2BF49349F1045E9D45AA2350DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: ef02de4c3753167f84c2417f9d24ec861cca938cf789949ba439da2fd9736032
                                                                                  • Instruction ID: c04161ba22ce5a76034319b410885dab62e6123c786e71aed23bbb69579a573e
                                                                                  • Opcode Fuzzy Hash: ef02de4c3753167f84c2417f9d24ec861cca938cf789949ba439da2fd9736032
                                                                                  • Instruction Fuzzy Hash: AF81A634906228CFCB64DFA5D88C79CB7B2BF49349F1045E9D45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 7000a4900f5eb0e3e6372e792281267850589c6d6c154d2300870acaebbd37c8
                                                                                  • Instruction ID: 4ea67ebc58b4170d9f027c718be3aa44dbe5a74f15ee6a9de184023c05bbe603
                                                                                  • Opcode Fuzzy Hash: 7000a4900f5eb0e3e6372e792281267850589c6d6c154d2300870acaebbd37c8
                                                                                  • Instruction Fuzzy Hash: E081A534906228CFCB64DFA5D88CB9CB7B2BF49349F1045E9D45AA2340DB359E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 760b638b80fc4473c674f08f21a7c67a5cec5af28939db274ae122c7489333ff
                                                                                  • Instruction ID: bd7cdc8b785edd71f41be2457bfab545d067ed8475fcb55ce40bbda6cacd313b
                                                                                  • Opcode Fuzzy Hash: 760b638b80fc4473c674f08f21a7c67a5cec5af28939db274ae122c7489333ff
                                                                                  • Instruction Fuzzy Hash: 0671B634906228CFCB64DFA5D88CB9DB7B2BF49349F1045E9D45AA2340DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.586883619.0000000006160000.00000040.00000800.00020000.00000000.sdmp, Offset: 06160000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_6160000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: 2b732da350364a1b089bd5b082e472cd36a4c734e0450c992ea1322849aba95f
                                                                                  • Instruction ID: 6c6c0d85370a0d7053f6ec1e93d24fb54bb87ffee668efbb4ddab7635118b963
                                                                                  • Opcode Fuzzy Hash: 2b732da350364a1b089bd5b082e472cd36a4c734e0450c992ea1322849aba95f
                                                                                  • Instruction Fuzzy Hash: AD51B431B002059FCB54EBB0D894AAEB7F6BF84308F158929E5129B391EF30D914CBA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 842baf37f0051fa48d2d1d482597012bb98616f944bf1c0440486740d655e762
                                                                                  • Instruction ID: dcc424faa7d8d7fd1e6417eeeb351ee5b138dc227bd5fa2f2d52cd01cba590b3
                                                                                  • Opcode Fuzzy Hash: 842baf37f0051fa48d2d1d482597012bb98616f944bf1c0440486740d655e762
                                                                                  • Instruction Fuzzy Hash: DC71A674906228CFCB64DFA5D88CB9CB7B2BF49349F1045E9D45AA2340DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 0450fe15a2ef4f80c96f3234e0863fe034df3e3a805401e82181516baaabc9dd
                                                                                  • Instruction ID: 0376adecb96816b204a906d3a894f5149b9bb2fbfdab940fe083b7e8f28232d2
                                                                                  • Opcode Fuzzy Hash: 0450fe15a2ef4f80c96f3234e0863fe034df3e3a805401e82181516baaabc9dd
                                                                                  • Instruction Fuzzy Hash: 8B619574906228CFCB64DFA5D88CB9CB7B2BF49349F1045E9D45AA2340DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.586883619.0000000006160000.00000040.00000800.00020000.00000000.sdmp, Offset: 06160000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_6160000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 0f54d600c256ad828b4d5ef793399b985c4fcd42584266640cf85af3d23c9e23
                                                                                  • Instruction ID: 7779e1a08f127d290af3836904f84eda6c953353b7bf9bf703a6c5a603ca29df
                                                                                  • Opcode Fuzzy Hash: 0f54d600c256ad828b4d5ef793399b985c4fcd42584266640cf85af3d23c9e23
                                                                                  • Instruction Fuzzy Hash: 9A417972D043558FCB04CFA9C8046EEBBF0EF89210F0985ABE444B7241DB74A955CBE1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 74db1657f9bcc4c0882bbb267f329fcc8d46f9130a22b8dee7d5bd21e0ca60e4
                                                                                  • Instruction ID: f8980a37fcb876a18fcac67301d50136e0b8c14001ed14d6845b4073835a76d8
                                                                                  • Opcode Fuzzy Hash: 74db1657f9bcc4c0882bbb267f329fcc8d46f9130a22b8dee7d5bd21e0ca60e4
                                                                                  • Instruction Fuzzy Hash: C861A674906228CFCB64DFA5D88CB9CB7B2BF89349F1045E9D45AA2340DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 3b3f1f777820c0f38f0875f0101a9b585696c6f76e88d29b0a1baa7548e5e857
                                                                                  • Instruction ID: 3f72d3e636c681b68d96f2147811da917fe93d83e5e4a36056a94437f31b0bbc
                                                                                  • Opcode Fuzzy Hash: 3b3f1f777820c0f38f0875f0101a9b585696c6f76e88d29b0a1baa7548e5e857
                                                                                  • Instruction Fuzzy Hash: 2951A674902228CFCB64DFA5D88CB9CB7B2BF89349F1445E9D45AA2340DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 4626837448f6239f52b533005bbcb432f7340b24556245d210dce5520152847d
                                                                                  • Instruction ID: 34ff5873926d798eded8e73a43454a0fcbb7928aa1f6968aaefea39a572c5d39
                                                                                  • Opcode Fuzzy Hash: 4626837448f6239f52b533005bbcb432f7340b24556245d210dce5520152847d
                                                                                  • Instruction Fuzzy Hash: 5C51B874902228CFCB64DFA5D888B9CB7B2FF49349F1045E9D45AA2350DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 831bda2344576d18953aadf62d52e8207d7cf088ca23559321a1089f104ccae7
                                                                                  • Instruction ID: e0760ca704369491e075255a0faed5a97302807928547d754298f8a499d57080
                                                                                  • Opcode Fuzzy Hash: 831bda2344576d18953aadf62d52e8207d7cf088ca23559321a1089f104ccae7
                                                                                  • Instruction Fuzzy Hash: 0151B574901228CFCB64DFA5D888B9CB7B2BF89349F1045E9D45AA2350DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 42ab88453138a6e4a46668890c9daa085d43f806e216c464b9167c95611bbe2c
                                                                                  • Instruction ID: e7fbbc9664dd7a1f3636e158c6b469e8287e9a5f16db24b26d5b1b236ad96e0f
                                                                                  • Opcode Fuzzy Hash: 42ab88453138a6e4a46668890c9daa085d43f806e216c464b9167c95611bbe2c
                                                                                  • Instruction Fuzzy Hash: C851C674901228CFCB64DFA5D888B9CB7B2FF89349F1045E9D45AA2340DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • DeleteFileW.KERNELBASE(00000000), ref: 05C67338
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteFile
                                                                                  • String ID:
                                                                                  • API String ID: 4033686569-0
                                                                                  • Opcode ID: 1bb06ce0b9208b43e5a57a19279645b0efd648cbae97d07385ccdce976cb7f09
                                                                                  • Instruction ID: ca6e62b0a2abf14fc85fe0ac81fc3fd5e8ef2e366f85dfc8489a099fbc7f194d
                                                                                  • Opcode Fuzzy Hash: 1bb06ce0b9208b43e5a57a19279645b0efd648cbae97d07385ccdce976cb7f09
                                                                                  • Instruction Fuzzy Hash: E7310F31E043449FDF10DBB4E8487EDBFF1EF49218F058828E545A7281DB346A19CB90
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 742b104b257c75916b242911c4805f11c4a44461172357907f9a945504ab5fb4
                                                                                  • Instruction ID: 3f9d74a4d9f0fb11f943fe018ba101e48e6760667c48f2d4ac9bdbcda765510b
                                                                                  • Opcode Fuzzy Hash: 742b104b257c75916b242911c4805f11c4a44461172357907f9a945504ab5fb4
                                                                                  • Instruction Fuzzy Hash: 0E41D734901228CFCB24DFA5D888B9CB7B2FF89349F1005E9D55AA2340DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • LoadLibraryA.KERNELBASE(?), ref: 0290D7E2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID:
                                                                                  • API String ID: 1029625771-0
                                                                                  • Opcode ID: bf8991bde2d43a33ee5b325b4ee110d08aed58309c61b92408597c94c2feef6b
                                                                                  • Instruction ID: 80da75b9c6e9228d3900934ba5732ce2638b4f222f67a89152b4a53669e9dafc
                                                                                  • Opcode Fuzzy Hash: bf8991bde2d43a33ee5b325b4ee110d08aed58309c61b92408597c94c2feef6b
                                                                                  • Instruction Fuzzy Hash: DB3110B1D042498FDB14CFA9C885BAEBBF5FB48314F14812AE855A7280D774A845CFA6
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 3bed23d029ea51b5d5871da0160247c73c3c2b5a1ce5bf8c9e01b2191c2e9a40
                                                                                  • Instruction ID: bca79330c0ca13914fa84aef2b5058c196f5258c7e6e353c9fe8a38757d9bd74
                                                                                  • Opcode Fuzzy Hash: 3bed23d029ea51b5d5871da0160247c73c3c2b5a1ce5bf8c9e01b2191c2e9a40
                                                                                  • Instruction Fuzzy Hash: B841D734901228CFCB64DFA5D888B9DB7B2FF85349F1045E9D45AA2340DB355E81CF92
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,?,?,00000000,?), ref: 06167E89
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.586883619.0000000006160000.00000040.00000800.00020000.00000000.sdmp, Offset: 06160000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_6160000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: QueryValue
                                                                                  • String ID:
                                                                                  • API String ID: 3660427363-0
                                                                                  • Opcode ID: 5305d1d9ccc3b53fb61f5952d2aaac125e060fac57345b042a05e354d99ec987
                                                                                  • Instruction ID: eda66bea117dba1f8be25422197d1bd535f2977458b0f58ee29d1e8602c35a04
                                                                                  • Opcode Fuzzy Hash: 5305d1d9ccc3b53fb61f5952d2aaac125e060fac57345b042a05e354d99ec987
                                                                                  • Instruction Fuzzy Hash: 8031E0B5D00258DFCB10CF9AC884ADEBBF5BF48714F15842AE819AB350D7749905CF90
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • LoadLibraryA.KERNELBASE(?), ref: 0290D7E2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID:
                                                                                  • API String ID: 1029625771-0
                                                                                  • Opcode ID: d5f4ea3683e4591fe23ab4066afd4169088855c3bf8c1034f17f41ad6613575c
                                                                                  • Instruction ID: 667e097beae784b26e756defcd6c48bd158a4f1792c7581009e25a0e04f63225
                                                                                  • Opcode Fuzzy Hash: d5f4ea3683e4591fe23ab4066afd4169088855c3bf8c1034f17f41ad6613575c
                                                                                  • Instruction Fuzzy Hash: 683142B1D002498FDB14CFA9C885BEEBBF5FB48314F14812AE855A7380D774A445CFA6
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,00000000,?,00000001,?), ref: 06167BCC
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.586883619.0000000006160000.00000040.00000800.00020000.00000000.sdmp, Offset: 06160000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_6160000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: Open
                                                                                  • String ID:
                                                                                  • API String ID: 71445658-0
                                                                                  • Opcode ID: 4a138ecaa15cf90322fa1149368a129d955c9ad69ea6287442219461ec81e04b
                                                                                  • Instruction ID: 00d37e6c79503ea0bbabf4a8f0c6abc59ece44a6b3512df7d464b21f5f15c9a8
                                                                                  • Opcode Fuzzy Hash: 4a138ecaa15cf90322fa1149368a129d955c9ad69ea6287442219461ec81e04b
                                                                                  • Instruction Fuzzy Hash: E33112B0D042498FCB10CF9AC584A8EFBF5BF48318F29C56AE409AB341C7759884CFA0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • DeleteFileW.KERNELBASE(00000000), ref: 05C67338
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteFile
                                                                                  • String ID:
                                                                                  • API String ID: 4033686569-0
                                                                                  • Opcode ID: f9a5ad430d316cf841faffe3180eb8b23d2424a2cf6798172130409c849cd360
                                                                                  • Instruction ID: 560d6f29c64412fff25e8a8a78446606c06626d36f2d71f6b83d9d59782fd96a
                                                                                  • Opcode Fuzzy Hash: f9a5ad430d316cf841faffe3180eb8b23d2424a2cf6798172130409c849cd360
                                                                                  • Instruction Fuzzy Hash: 56318C71D097598FCB01CFA9C854BEEBBF0FF49314F15896AD808A7641D738A905CBA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: ed1a52d22bdd5f3e87f994c4d4706b7203708c5624f02d036cde4f29418fffab
                                                                                  • Instruction ID: 86d182f51680b0e5248efde9a4d2c3011fc4abe60d8b3b36820dc419b199588a
                                                                                  • Opcode Fuzzy Hash: ed1a52d22bdd5f3e87f994c4d4706b7203708c5624f02d036cde4f29418fffab
                                                                                  • Instruction Fuzzy Hash: B641D534901228CFCB64DFA5D888B9DB7B2FF85349F1045E9D45AA2340DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 399766c31eca6557e190bcb3ddc4df051364699881bfa3454cc1a33db7eb7a75
                                                                                  • Instruction ID: 08043664b4ff04685a7c7bf394b4c2190bf481e9524b8de4916cb66012384cf7
                                                                                  • Opcode Fuzzy Hash: 399766c31eca6557e190bcb3ddc4df051364699881bfa3454cc1a33db7eb7a75
                                                                                  • Instruction Fuzzy Hash: 9331E834905228CFCB24DFA5D88879CBBB2FF85349F1005E9D45AA2340DB355E81CF62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 9b10fe824b480d532abd44cf233f4e84a8ff093655eb2ab02f9310727ba2628b
                                                                                  • Instruction ID: 54cf51eb56600cb1727eb26656d8ab6b85d86abf4b5ddd93c05e8231f2f085e4
                                                                                  • Opcode Fuzzy Hash: 9b10fe824b480d532abd44cf233f4e84a8ff093655eb2ab02f9310727ba2628b
                                                                                  • Instruction Fuzzy Hash: F831C474A05228CFCB25DFA8D888B9DB7B2FF89345F1005E9D45AA2340DB359E81CF52
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 029058BA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: EncodePointer
                                                                                  • String ID:
                                                                                  • API String ID: 2118026453-0
                                                                                  • Opcode ID: 85405ad0d4ac0337431e257264895e1a268dfc1ba30b6261e0c842591e51562c
                                                                                  • Instruction ID: cdb058cce07d54e0a38867572df9263549c7e4d2685055392f138ebe41d7d972
                                                                                  • Opcode Fuzzy Hash: 85405ad0d4ac0337431e257264895e1a268dfc1ba30b6261e0c842591e51562c
                                                                                  • Instruction Fuzzy Hash: 9F21BCB690430A8FDB04DFA5D4893DE7FF4FB44304F65802AE809AB680DB759504CF91
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 0130ba3b9394f02f04ed68be930945713eaf799b59eeadcef659b7c68befdd48
                                                                                  • Instruction ID: 318324af40782692d0276f1e7c2a9ae579f79eb41f2207a504d0c7dc8922e917
                                                                                  • Opcode Fuzzy Hash: 0130ba3b9394f02f04ed68be930945713eaf799b59eeadcef659b7c68befdd48
                                                                                  • Instruction Fuzzy Hash: 8031D674905228CFCB20DFA5D88879DB7B2FF89345F1045E9D55AA2340DB355E81CF92
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0616A422), ref: 0616A50F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.586883619.0000000006160000.00000040.00000800.00020000.00000000.sdmp, Offset: 06160000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_6160000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: GlobalMemoryStatus
                                                                                  • String ID:
                                                                                  • API String ID: 1890195054-0
                                                                                  • Opcode ID: 745cce74c8009d5d9ee7e9476868add4619749466f34feb636877ccf740b5fcf
                                                                                  • Instruction ID: 3e44f122a9348621bc4eb069dc77c08c95bad1ee12c3060a6ffb0bae099b06f5
                                                                                  • Opcode Fuzzy Hash: 745cce74c8009d5d9ee7e9476868add4619749466f34feb636877ccf740b5fcf
                                                                                  • Instruction Fuzzy Hash: 5C2122B1C042598FCB00CFAAC948BEEBBB4AF48224F15856AE554B7241D378A945CFA5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • DeleteFileW.KERNELBASE(00000000), ref: 05C67338
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DeleteFile
                                                                                  • String ID:
                                                                                  • API String ID: 4033686569-0
                                                                                  • Opcode ID: d31d7c6559cb4fd041eb5e6ffe7d2799df051e45e06464302c3ea8cdd6629cff
                                                                                  • Instruction ID: 8367557a187efea0b1ea85425dafcb20d9f1b8c2f330ff2a0cc8093446c551aa
                                                                                  • Opcode Fuzzy Hash: d31d7c6559cb4fd041eb5e6ffe7d2799df051e45e06464302c3ea8cdd6629cff
                                                                                  • Instruction Fuzzy Hash: 602147B1C046199BCB14CF9AC444BAEFBF4FB48224F15852AE815B7640D734AA45CFE1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 029058BA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: EncodePointer
                                                                                  • String ID:
                                                                                  • API String ID: 2118026453-0
                                                                                  • Opcode ID: 0a641abc694eed0bda17faf0d7cc6803000d6ed95f8abb9217d4f9ed6f1219d2
                                                                                  • Instruction ID: 0c3f047fdc5155911a54de838c901e9c729599fcd75ba333b11cde073dcd2054
                                                                                  • Opcode Fuzzy Hash: 0a641abc694eed0bda17faf0d7cc6803000d6ed95f8abb9217d4f9ed6f1219d2
                                                                                  • Instruction Fuzzy Hash: 3421A9B69053498FCB10DFA5D5493AEBFF4FB44328F24886ED845A7241D7389404CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,0616A422), ref: 0616A50F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.586883619.0000000006160000.00000040.00000800.00020000.00000000.sdmp, Offset: 06160000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_6160000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: GlobalMemoryStatus
                                                                                  • String ID:
                                                                                  • API String ID: 1890195054-0
                                                                                  • Opcode ID: c8eeab5fa46e396a68587161de105784241d26f03ffaa65e3d5131cc49deb2c1
                                                                                  • Instruction ID: 913ad9d2bef9482d8ae8485c8f9ed24505da0f91f3ee4927e0d2e83fdbc4436e
                                                                                  • Opcode Fuzzy Hash: c8eeab5fa46e396a68587161de105784241d26f03ffaa65e3d5131cc49deb2c1
                                                                                  • Instruction Fuzzy Hash: 0611F2B1C046199FCB10CF9AC848BAEBBB4EF48224F15856AE914B7240D778A954CFE5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • RtlEncodePointer.NTDLL(00000000), ref: 029058BA
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: EncodePointer
                                                                                  • String ID:
                                                                                  • API String ID: 2118026453-0
                                                                                  • Opcode ID: ccecfe48367e22400f586212471752772083b7a410959d6f719967c1a605555b
                                                                                  • Instruction ID: 517b3566590e3d1ccd9f903e9fbc7f03bc2882fb14ced44228a26b226c881d87
                                                                                  • Opcode Fuzzy Hash: ccecfe48367e22400f586212471752772083b7a410959d6f719967c1a605555b
                                                                                  • Instruction Fuzzy Hash: 2F1159B29053498FCB10DFAAD4497DEBBF8FB48314F648429D805A7640D778A944CFA5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 3ea2c4faa3c51559e9adf600182840ff15a31d1fb8547ff08dd65263800ec453
                                                                                  • Instruction ID: 0118279ac8114d1b70b1eb4b4f111f97f4e7affb6d9b26f3b2071bbe3d960be9
                                                                                  • Opcode Fuzzy Hash: 3ea2c4faa3c51559e9adf600182840ff15a31d1fb8547ff08dd65263800ec453
                                                                                  • Instruction Fuzzy Hash: 8221B374905228CFCB60DFA9D888B9DB7B2FF89315F1005E9D55AA2340DB355E81CF52
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.586695035.0000000006130000.00000040.00000800.00020000.00000000.sdmp, Offset: 06130000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_6130000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: InitializeThunk
                                                                                  • String ID:
                                                                                  • API String ID: 2994545307-0
                                                                                  • Opcode ID: cdf70fe8f576d968967e135ae213a1d6d652b6e0e323d4e07e965b42a8259452
                                                                                  • Instruction ID: eecd247a58c4531b480ceb4534540222b40ec81fca0e2e1c21432e1974c2638c
                                                                                  • Opcode Fuzzy Hash: cdf70fe8f576d968967e135ae213a1d6d652b6e0e323d4e07e965b42a8259452
                                                                                  • Instruction Fuzzy Hash: CC111970E11258DFCB54DFA5D998AADBBB2FF48318F108868D402A7750DB369889CF94
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • VirtualAllocExNuma.KERNELBASE(?,?,?,?,?,?), ref: 02900B06
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: AllocNumaVirtual
                                                                                  • String ID:
                                                                                  • API String ID: 4233825816-0
                                                                                  • Opcode ID: 7d9b679a57b4af70bae0f225a1e99b32be6bb9effc1d3226ac5ea7d9140b73f4
                                                                                  • Instruction ID: 877c353a79c019e7a26e4ecadd9371e54bdf2ced89a467d40d59f83f8d5f771f
                                                                                  • Opcode Fuzzy Hash: 7d9b679a57b4af70bae0f225a1e99b32be6bb9effc1d3226ac5ea7d9140b73f4
                                                                                  • Instruction Fuzzy Hash: 3D11F0B29002099FCB10CF9AC888BDEBFF8EB88324F148419E559A7250D775A954CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: b2f125ca2b0663885191a7456943008bfb012fab8c90e939283f3707e0b5c733
                                                                                  • Instruction ID: 7953350ec75d47c2d3978c98e34ffca885f21c9c04ac5066cadee07db34c7c91
                                                                                  • Opcode Fuzzy Hash: b2f125ca2b0663885191a7456943008bfb012fab8c90e939283f3707e0b5c733
                                                                                  • Instruction Fuzzy Hash: 7811B074905228CFCB20DFA9D888B9DB7B2FF89305F1045EAD54AA3240DB355E81CF92
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  • KiUserExceptionDispatcher.NTDLL ref: 05C68B00
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.585639723.0000000005C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C60000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_5c60000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: DispatcherExceptionUser
                                                                                  • String ID:
                                                                                  • API String ID: 6842923-0
                                                                                  • Opcode ID: 274ef169ba7e11f9bc8c7552513d5a545307245e30db0f0774e8fe3d9e04189e
                                                                                  • Instruction ID: b69cb14040bb2a474cd7a42b8723b6ee37021259a4805b187bef4b249a47e196
                                                                                  • Opcode Fuzzy Hash: 274ef169ba7e11f9bc8c7552513d5a545307245e30db0f0774e8fe3d9e04189e
                                                                                  • Instruction Fuzzy Hash: D011E274905228CFCB21DFA8D888B8CB7B2FF88305F1002EAD549A3241DB315E81CF91
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: c5106aa2f8a108d800e3b22baa3116e1c93b33de28de497b0654a18fea45a7f7
                                                                                  • Instruction ID: ff2b0552523e2af896cea076103f8fc0d6d3c0f8f6f33731a369f66d182fd0a4
                                                                                  • Opcode Fuzzy Hash: c5106aa2f8a108d800e3b22baa3116e1c93b33de28de497b0654a18fea45a7f7
                                                                                  • Instruction Fuzzy Hash: 05316EB2E00219CFCF10DFB8C4857EDBBF4AF58218F14446AD909A7240E735A945CBA4
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 71786f41887b61975b2d5a344016d6a38c695a1d33517a28b789a33517d043ca
                                                                                  • Instruction ID: 56494b54aee952ee5c9dc75589e6426b256dfdc848ced4e1037bf778c8d002db
                                                                                  • Opcode Fuzzy Hash: 71786f41887b61975b2d5a344016d6a38c695a1d33517a28b789a33517d043ca
                                                                                  • Instruction Fuzzy Hash: 1D1100B19042498FDB10CF9AC488BDEBBF4EB88328F14845ED559A7640D7B4AA44CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  APIs
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569512967.0000000002900000.00000040.00000800.00020000.00000000.sdmp, Offset: 02900000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_2900000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID: Sleep
                                                                                  • String ID:
                                                                                  • API String ID: 3472027048-0
                                                                                  • Opcode ID: 57c29a62f920df36744c97ef080ffc89c79f942c076af02a4cea088208dd3de4
                                                                                  • Instruction ID: 7832c08de25e7c688970a862bb62ea0df17fc355b94186363bb1e6073b25ce17
                                                                                  • Opcode Fuzzy Hash: 57c29a62f920df36744c97ef080ffc89c79f942c076af02a4cea088208dd3de4
                                                                                  • Instruction Fuzzy Hash: FB11E2B19042498FCB10DF9AC484BDEBBF4EB48328F14845AD559A7240D774A944CFA5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569009699.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_f7d000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 737569173261955b51c656cc4d0ad2721bdb9883e062c61386abc0566d955417
                                                                                  • Instruction ID: ea7fe0992b76bd76412d00065182231653931ec454f6eaefc2bfc7e53071d993
                                                                                  • Opcode Fuzzy Hash: 737569173261955b51c656cc4d0ad2721bdb9883e062c61386abc0566d955417
                                                                                  • Instruction Fuzzy Hash: EF42C46248E7D54FE3075B6089627913FB1EF23225B4E41EBD084CF9A3D25D8D4AC762
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569009699.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_f7d000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 1c7267d821085fc1da7b963a3b49dc46cf75398c70b44e8ae05b24a3914646f1
                                                                                  • Instruction ID: 84ecfe760b2baf5dbac739f3dce3a449b96094202a90c6f7310ee5d542642264
                                                                                  • Opcode Fuzzy Hash: 1c7267d821085fc1da7b963a3b49dc46cf75398c70b44e8ae05b24a3914646f1
                                                                                  • Instruction Fuzzy Hash: E281E77648E7C05FD3078B608C65A917FB0EB17224F1E81EBD484CF5A7D26D885AC762
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.568911174.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_f6d000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 67138493e0df69dcd179d760bf5b1d3a5aed17b111a1bbe0a18134b0efa91ef8
                                                                                  • Instruction ID: e671b6dbc67b429807f78ba1ecc22b75deabe06e642bb92c54de065333c28cc0
                                                                                  • Opcode Fuzzy Hash: 67138493e0df69dcd179d760bf5b1d3a5aed17b111a1bbe0a18134b0efa91ef8
                                                                                  • Instruction Fuzzy Hash: 262128B2E04244DFDB04CF10D9C0F26BB65FB98328F28856DE9064B656C336DC45EBA2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.569009699.0000000000F7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F7D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_f7d000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a4b54f78fa241cd20e3e0871dea462a1cf9e40c93026fa1142064f18986e2328
                                                                                  • Instruction ID: 9255574446cdf865365792787b3be706a61674229c69cd4f20dbd7c03fa653ee
                                                                                  • Opcode Fuzzy Hash: a4b54f78fa241cd20e3e0871dea462a1cf9e40c93026fa1142064f18986e2328
                                                                                  • Instruction Fuzzy Hash: 3C21F875604244DFDB04CF10D9C4B26BB65FB88324F24C9AFD94D4B246C336D845DAA2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000001.00000002.568911174.0000000000F6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F6D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_1_2_f6d000_payment swift.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f21b28fad4208f8a7773c4da12b744b29c369e0cd12ff14c60c0cef6af4301ee
                                                                                  • Instruction ID: 7ad0e71d5a566d6e9d827accfd909563b9f5207f7a12eb21fd6c72a32b31a653
                                                                                  • Opcode Fuzzy Hash: f21b28fad4208f8a7773c4da12b744b29c369e0cd12ff14c60c0cef6af4301ee
                                                                                  • Instruction Fuzzy Hash: EA11D376904280DFCB15CF10D5C4B16BF71FB98328F28C6A9D8064B656C33AD856DBA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Execution Graph

                                                                                  Execution Coverage:10.3%
                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                  Signature Coverage:0%
                                                                                  Total number of Nodes:106
                                                                                  Total number of Limit Nodes:11
                                                                                  execution_graph 14645 24340d0 14646 24340e2 14645->14646 14647 24340ee 14646->14647 14651 24341e0 14646->14651 14656 2433c64 14647->14656 14649 243410d 14652 2434205 14651->14652 14660 24342d1 14652->14660 14664 24342e0 14652->14664 14657 2433c6f 14656->14657 14672 24351a4 14657->14672 14659 2436a50 14659->14649 14662 2434307 14660->14662 14661 24343e4 14661->14661 14662->14661 14668 2433de4 14662->14668 14666 2434307 14664->14666 14665 24343e4 14665->14665 14666->14665 14667 2433de4 CreateActCtxA 14666->14667 14667->14665 14669 2435370 CreateActCtxA 14668->14669 14671 2435433 14669->14671 14671->14671 14673 24351af 14672->14673 14676 24357f8 14673->14676 14675 2436af5 14675->14659 14677 2435803 14676->14677 14680 2435828 14677->14680 14679 2436bda 14679->14675 14681 2435833 14680->14681 14684 2435858 14681->14684 14683 2436cca 14683->14679 14686 2435863 14684->14686 14685 243741c 14685->14683 14686->14685 14688 243b2f0 14686->14688 14689 243b321 14688->14689 14690 243b345 14689->14690 14693 243b5a9 14689->14693 14698 243b5b8 14689->14698 14690->14685 14694 243b525 14693->14694 14696 243b5b2 14693->14696 14695 243b5ff 14695->14690 14696->14695 14702 24397b8 14696->14702 14700 243b5c5 14698->14700 14699 243b5ff 14699->14690 14700->14699 14701 24397b8 LoadLibraryExW 14700->14701 14701->14699 14703 24397c3 14702->14703 14704 243c2f8 14703->14704 14706 2439880 14703->14706 14707 243988b 14706->14707 14708 2435858 LoadLibraryExW 14707->14708 14710 243c367 14707->14710 14708->14710 14709 243c3a0 14709->14704 14713 243e0d8 14710->14713 14719 243e0e8 14710->14719 14715 243e165 14713->14715 14716 243e119 14713->14716 14714 243e125 14714->14709 14715->14709 14716->14714 14717 243e558 LoadLibraryExW 14716->14717 14718 243e568 LoadLibraryExW 14716->14718 14717->14715 14718->14715 14720 243e119 14719->14720 14722 243e165 14719->14722 14721 243e125 14720->14721 14723 243e558 LoadLibraryExW 14720->14723 14724 243e568 LoadLibraryExW 14720->14724 14721->14709 14722->14709 14723->14722 14724->14722 14725 24391d0 14726 24391df 14725->14726 14729 24392c8 14725->14729 14734 24392b8 14725->14734 14730 24392db 14729->14730 14731 24392eb 14730->14731 14739 2439948 14730->14739 14743 2439958 14730->14743 14731->14726 14735 24392db 14734->14735 14736 24392eb 14735->14736 14737 2439948 LoadLibraryExW 14735->14737 14738 2439958 LoadLibraryExW 14735->14738 14736->14726 14737->14736 14738->14736 14740 243996c 14739->14740 14741 2439991 14740->14741 14747 24394b8 14740->14747 14741->14731 14744 243996c 14743->14744 14745 2439991 14744->14745 14746 24394b8 LoadLibraryExW 14744->14746 14745->14731 14746->14745 14748 2439b38 LoadLibraryExW 14747->14748 14750 2439bb1 14748->14750 14750->14741 14751 243b6d0 GetCurrentProcess 14752 243b743 14751->14752 14753 243b74a GetCurrentThread 14751->14753 14752->14753 14754 243b780 14753->14754 14755 243b787 GetCurrentProcess 14753->14755 14754->14755 14756 243b7bd 14755->14756 14757 243b7e5 GetCurrentThreadId 14756->14757 14758 243b816 14757->14758 14759 24398b0 14760 24398f2 14759->14760 14761 24398f8 GetModuleHandleW 14759->14761 14760->14761 14762 2439925 14761->14762 14763 6b78020 14764 6b781ab 14763->14764 14765 6b78046 14763->14765 14765->14764 14767 6b782a0 PostMessageW 14765->14767 14768 6b7830c 14767->14768 14768->14765 14769 243fd38 14770 243fda0 CreateWindowExW 14769->14770 14772 243fe5c 14770->14772 14773 243b8f8 DuplicateHandle 14774 243b98e 14773->14774 14775 6b78c88 FindCloseChangeNotification 14776 6b78cef 14775->14776

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32 ref: 0243B730
                                                                                  • GetCurrentThread.KERNEL32 ref: 0243B76D
                                                                                  • GetCurrentProcess.KERNEL32 ref: 0243B7AA
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0243B803
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: Current$ProcessThread
                                                                                  • String ID:
                                                                                  • API String ID: 2063062207-0
                                                                                  • Opcode ID: c01fdc3f2560380c7a3437ab69891becf9e90865eabaceaaea701c23485ce964
                                                                                  • Instruction ID: 24498ef9973b856137f77f4f1add54b8d4d9cc147a495a0d1c5f4699b8476df0
                                                                                  • Opcode Fuzzy Hash: c01fdc3f2560380c7a3437ab69891becf9e90865eabaceaaea701c23485ce964
                                                                                  • Instruction Fuzzy Hash: AB5153B09006498FDB54CFA9C588BAEBBF0FB48318F24805EE019A7350D738A945CF61
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  APIs
                                                                                  • GetCurrentProcess.KERNEL32 ref: 0243B730
                                                                                  • GetCurrentThread.KERNEL32 ref: 0243B76D
                                                                                  • GetCurrentProcess.KERNEL32 ref: 0243B7AA
                                                                                  • GetCurrentThreadId.KERNEL32 ref: 0243B803
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: Current$ProcessThread
                                                                                  • String ID:
                                                                                  • API String ID: 2063062207-0
                                                                                  • Opcode ID: a986a5b1cb6e3a51080bcfba947ff18d9907165b08c3e6c722c704b29f8e1068
                                                                                  • Instruction ID: 5cb776cdb34a80a166abfbb41071ff5c7416b7e1341652f20fe3982282fb9af6
                                                                                  • Opcode Fuzzy Hash: a986a5b1cb6e3a51080bcfba947ff18d9907165b08c3e6c722c704b29f8e1068
                                                                                  • Instruction Fuzzy Hash: D35153B0900649CFDB54CFAAC588BAEBBF1FB48308F24805EE419A7350D778A945CF65
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 38 243fd2c-243fd9e 40 243fda0-243fda6 38->40 41 243fda9-243fdb0 38->41 40->41 42 243fdb2-243fdb8 41->42 43 243fdbb-243fdf3 41->43 42->43 44 243fdfb-243fe5a CreateWindowExW 43->44 45 243fe63-243fe9b 44->45 46 243fe5c-243fe62 44->46 50 243fea8 45->50 51 243fe9d-243fea0 45->51 46->45 52 243fea9 50->52 51->50 52->52
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0243FE4A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 716092398-0
                                                                                  • Opcode ID: 4ab7bac69b8c3e5d84d3b46344c7aa78daf6d6ab8c8b569bc4fc7e48c83f1347
                                                                                  • Instruction ID: 02dfc4ab0bfb6c3abeb9afb07abab3616686677dbc2dae3fb970ded55e26c311
                                                                                  • Opcode Fuzzy Hash: 4ab7bac69b8c3e5d84d3b46344c7aa78daf6d6ab8c8b569bc4fc7e48c83f1347
                                                                                  • Instruction Fuzzy Hash: 1451D0B1D002499FDF15CF99C884ADEBFF5BF88314F25812AE819AB210D7749985CF90
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 53 243fd38-243fd9e 54 243fda0-243fda6 53->54 55 243fda9-243fdb0 53->55 54->55 56 243fdb2-243fdb8 55->56 57 243fdbb-243fe5a CreateWindowExW 55->57 56->57 59 243fe63-243fe9b 57->59 60 243fe5c-243fe62 57->60 64 243fea8 59->64 65 243fe9d-243fea0 59->65 60->59 66 243fea9 64->66 65->64 66->66
                                                                                  APIs
                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 0243FE4A
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: CreateWindow
                                                                                  • String ID:
                                                                                  • API String ID: 716092398-0
                                                                                  • Opcode ID: 6a19de1906aee4d5d16204d2d5aa793dbd5d34fd351c76a01f0d1b3fd51a1b01
                                                                                  • Instruction ID: 7cda31f34653289922c2fbba78191f49a73c424973efcbc17ab90ac6b5d03239
                                                                                  • Opcode Fuzzy Hash: 6a19de1906aee4d5d16204d2d5aa793dbd5d34fd351c76a01f0d1b3fd51a1b01
                                                                                  • Instruction Fuzzy Hash: 9E41AFB1D003099FDF15CF99C884ADEBBB5BF88314F25812AE819AB210D774A985CF91
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 84 2435364-2435431 CreateActCtxA 86 2435433-2435439 84->86 87 243543a-2435494 84->87 86->87 94 24354a3-24354a7 87->94 95 2435496-2435499 87->95 96 24354a9-24354b5 94->96 97 24354b8 94->97 95->94 96->97 98 24354b9 97->98 98->98
                                                                                  APIs
                                                                                  • CreateActCtxA.KERNEL32(?), ref: 02435421
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create
                                                                                  • String ID:
                                                                                  • API String ID: 2289755597-0
                                                                                  • Opcode ID: d0724b528ba91e6b5df79b327985cfc95581be9c6a4bc3d47bec0c6186078f02
                                                                                  • Instruction ID: 589dca43b68ce1cece5d36f7ebb29e98fa5c50bd6793255c5812292020c99f4a
                                                                                  • Opcode Fuzzy Hash: d0724b528ba91e6b5df79b327985cfc95581be9c6a4bc3d47bec0c6186078f02
                                                                                  • Instruction Fuzzy Hash: BE410070C04619CFDB28CFA9C884BDEBBB1BF58318F25805AD408AB251D7756946CF90
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 67 2433de4-2435431 CreateActCtxA 70 2435433-2435439 67->70 71 243543a-2435494 67->71 70->71 78 24354a3-24354a7 71->78 79 2435496-2435499 71->79 80 24354a9-24354b5 78->80 81 24354b8 78->81 79->78 80->81 82 24354b9 81->82 82->82
                                                                                  APIs
                                                                                  • CreateActCtxA.KERNEL32(?), ref: 02435421
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: Create
                                                                                  • String ID:
                                                                                  • API String ID: 2289755597-0
                                                                                  • Opcode ID: e1a442ff841aada036d127aa01030e6d159790f171b3ca7cc3b1b99ce5570ba5
                                                                                  • Instruction ID: f0686a95ef8fd7b5ff64dfc52296f4244ad03c2f5bb04a9259e02effd2341535
                                                                                  • Opcode Fuzzy Hash: e1a442ff841aada036d127aa01030e6d159790f171b3ca7cc3b1b99ce5570ba5
                                                                                  • Instruction Fuzzy Hash: A941F270C00618CFDB24DFA9C884BDEBBB1BF98319F64806AD409BB251DB756945CF90
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 100 2439842-2439851 101 2439853-2439859 100->101 102 24398a6-24398ad 100->102 103 243985b-2439878 101->103 102->103 104 24398af-24398f0 102->104 103->102 106 24398f2-24398f5 104->106 107 24398f8-2439923 GetModuleHandleW 104->107 106->107 108 2439925-243992b 107->108 109 243992c-2439940 107->109 108->109
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02439916
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModule
                                                                                  • String ID:
                                                                                  • API String ID: 4139908857-0
                                                                                  • Opcode ID: 10360e304290780eb1196ff128ab9fa697a73399431028729e8b0ab9c8a41849
                                                                                  • Instruction ID: 90ff859dfbbd01f5eb84aaf04cd0f0cd625a818156c77f1396506f2e13682dc6
                                                                                  • Opcode Fuzzy Hash: 10360e304290780eb1196ff128ab9fa697a73399431028729e8b0ab9c8a41849
                                                                                  • Instruction Fuzzy Hash: 57219AB28043888FDB12CF9AC4447DABFF4EF89314F05849AD495A7342D3789546CFA2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 111 243b8f2-243b98c DuplicateHandle 112 243b995-243b9b2 111->112 113 243b98e-243b994 111->113 113->112
                                                                                  APIs
                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0243B97F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: DuplicateHandle
                                                                                  • String ID:
                                                                                  • API String ID: 3793708945-0
                                                                                  • Opcode ID: 6772dd976faa6e684ee6d61de5466fabdb97b8509b0a2e66a0c3e50392abdf1d
                                                                                  • Instruction ID: 82c5cbe684b98adc76d6514a2aed07c961afc4ecc046670eb5c63264ab9b1797
                                                                                  • Opcode Fuzzy Hash: 6772dd976faa6e684ee6d61de5466fabdb97b8509b0a2e66a0c3e50392abdf1d
                                                                                  • Instruction Fuzzy Hash: 092114B59002499FDF10CFA9D484ADEBFF4EF48324F14841AE955A7310D378A944CFA0
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 116 243b8f8-243b98c DuplicateHandle 117 243b995-243b9b2 116->117 118 243b98e-243b994 116->118 118->117
                                                                                  APIs
                                                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0243B97F
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: DuplicateHandle
                                                                                  • String ID:
                                                                                  • API String ID: 3793708945-0
                                                                                  • Opcode ID: 94bc23b86bedff565faac484640fc7bf3892831e652079c995ff404a8f85195b
                                                                                  • Instruction ID: 600b4bdec3a294766416857dc331053675ec73cc3eeb2967cf93ddf6f6163460
                                                                                  • Opcode Fuzzy Hash: 94bc23b86bedff565faac484640fc7bf3892831e652079c995ff404a8f85195b
                                                                                  • Instruction Fuzzy Hash: EB21E2B59002099FDB10CFAAD884ADEBBF8EB48324F14841AE954A7310D378A944CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 121 24394b8-2439b78 123 2439b80-2439baf LoadLibraryExW 121->123 124 2439b7a-2439b7d 121->124 125 2439bb1-2439bb7 123->125 126 2439bb8-2439bd5 123->126 124->123 125->126
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02439991,00000800,00000000,00000000), ref: 02439BA2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID:
                                                                                  • API String ID: 1029625771-0
                                                                                  • Opcode ID: 3f9c9f51d3e754b526845e44616ecfb9cf01f700a8a017ae6b555024c1e48b57
                                                                                  • Instruction ID: 031b05419c36cfa719b90e5768f996134dd64c7f1c3fc9684d6af999e81e98be
                                                                                  • Opcode Fuzzy Hash: 3f9c9f51d3e754b526845e44616ecfb9cf01f700a8a017ae6b555024c1e48b57
                                                                                  • Instruction Fuzzy Hash: 2111D3B69042499FDB10CF9AC444BDEFBF4EB98364F14842EE915A7200C3B5A945CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 129 2439b30-2439b78 130 2439b80-2439baf LoadLibraryExW 129->130 131 2439b7a-2439b7d 129->131 132 2439bb1-2439bb7 130->132 133 2439bb8-2439bd5 130->133 131->130 132->133
                                                                                  APIs
                                                                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02439991,00000800,00000000,00000000), ref: 02439BA2
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: LibraryLoad
                                                                                  • String ID:
                                                                                  • API String ID: 1029625771-0
                                                                                  • Opcode ID: 8a7559fafccecb5312f5cccb00acd41ef84c6d22d494477da3e9e988dbfdb88e
                                                                                  • Instruction ID: c0c53cf02179d5c25dc28b99b608ba205fb011b5c9ee55cb85b4de9e2dee2b39
                                                                                  • Opcode Fuzzy Hash: 8a7559fafccecb5312f5cccb00acd41ef84c6d22d494477da3e9e988dbfdb88e
                                                                                  • Instruction Fuzzy Hash: AB11F6B69002498FCB10CF9AD484BEEFBF4FB98364F14846ED455A7200C379A945CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 142 6b78c88-6b78ced FindCloseChangeNotification 143 6b78cf6-6b78d1e 142->143 144 6b78cef-6b78cf5 142->144 144->143
                                                                                  APIs
                                                                                  • FindCloseChangeNotification.KERNELBASE(?), ref: 06B78CE0
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.364225915.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_6b70000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: ChangeCloseFindNotification
                                                                                  • String ID:
                                                                                  • API String ID: 2591292051-0
                                                                                  • Opcode ID: a1f9f114765cbd6402bef210d662e69dad2f7b42e17fbb9960bc9aa3801d9b48
                                                                                  • Instruction ID: f4ed0ef3dadc814c7b5315330502ae60274019a4346a8c853947d8b39f0080c2
                                                                                  • Opcode Fuzzy Hash: a1f9f114765cbd6402bef210d662e69dad2f7b42e17fbb9960bc9aa3801d9b48
                                                                                  • Instruction Fuzzy Hash: EA1118B28002498FCB50CF99C448BDEBBF4FB48324F148469D955A7340D738A944CFA5
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 136 24398b0-24398f0 137 24398f2-24398f5 136->137 138 24398f8-2439923 GetModuleHandleW 136->138 137->138 139 2439925-243992b 138->139 140 243992c-2439940 138->140 139->140
                                                                                  APIs
                                                                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 02439916
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359877318.0000000002430000.00000040.00000800.00020000.00000000.sdmp, Offset: 02430000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_2430000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: HandleModule
                                                                                  • String ID:
                                                                                  • API String ID: 4139908857-0
                                                                                  • Opcode ID: 50c745a647b07f75abfe36f6238b7f4101d8653176df54152a338437e3f554a5
                                                                                  • Instruction ID: bfebe8335394f46966ababd7360d8225e0247f20d147ffa801b887239be263b0
                                                                                  • Opcode Fuzzy Hash: 50c745a647b07f75abfe36f6238b7f4101d8653176df54152a338437e3f554a5
                                                                                  • Instruction Fuzzy Hash: 6711CDB6D002498BCB14CF9AD444BDEBBF4EB88224F14845AD869A7700D379A545CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Control-flow Graph

                                                                                  • Executed
                                                                                  • Not Executed
                                                                                  control_flow_graph 147 6b782a0-6b7830a PostMessageW 148 6b78313-6b78327 147->148 149 6b7830c-6b78312 147->149 149->148
                                                                                  APIs
                                                                                  • PostMessageW.USER32(?,?,?,?), ref: 06B782FD
                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.364225915.0000000006B70000.00000040.00000800.00020000.00000000.sdmp, Offset: 06B70000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_6b70000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID: MessagePost
                                                                                  • String ID:
                                                                                  • API String ID: 410705778-0
                                                                                  • Opcode ID: 89e9a0364fcec2d308bfee4a4feb2c01733ee271786e16ba793f238c2d3e597c
                                                                                  • Instruction ID: 9e078028c328b40621fdb14bcc3b31bf4388e9f33fc70ca03fb9a5e28594ca1c
                                                                                  • Opcode Fuzzy Hash: 89e9a0364fcec2d308bfee4a4feb2c01733ee271786e16ba793f238c2d3e597c
                                                                                  • Instruction Fuzzy Hash: B511E5B58003499FDB60CF99D888BDEBBF8EB58324F148459E555A7240C378A944CFA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359555554.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_97d000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 79c04b7ffe65b9e307f56f9372b80cd408f8db70c67d0a857bd580e30675e6c6
                                                                                  • Instruction ID: 400e78398a0f47f86fd6280ddcd821b5d912dff1c5c513d8515ce78a0bfab6e3
                                                                                  • Opcode Fuzzy Hash: 79c04b7ffe65b9e307f56f9372b80cd408f8db70c67d0a857bd580e30675e6c6
                                                                                  • Instruction Fuzzy Hash: AF2103B2504240DFDB05DF10D9C0B26BF75FF88328F24C569E9095B25AC33AD846CBA2
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359604853.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_98d000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: c5b2302537f2ee8ea9a54569579b36466f57c18dbf69b17a9bb1d168fe344b57
                                                                                  • Instruction ID: 2160ad635af45aa66d89bf94fe195a73649c622fdcfb363063c735dc1771d75c
                                                                                  • Opcode Fuzzy Hash: c5b2302537f2ee8ea9a54569579b36466f57c18dbf69b17a9bb1d168fe344b57
                                                                                  • Instruction Fuzzy Hash: E321F571504244DFDB14EF10D9C4B26BB65FB84328F24C96DE94A4B386C33AD846CB61
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359604853.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_98d000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a7addd180407266aecf0528eb1a17bc404dc6cbda365bf3f24df7728c6c327ab
                                                                                  • Instruction ID: 6e7ecfaa4005acc4a246d152040e05fcfcf810fce1c1d428cd0d89d076a909d1
                                                                                  • Opcode Fuzzy Hash: a7addd180407266aecf0528eb1a17bc404dc6cbda365bf3f24df7728c6c327ab
                                                                                  • Instruction Fuzzy Hash: 8521F5B1504244EFDB05EF50D5C4F26BB65FB84318F24C96DE9094B386C33AD846CB61
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359604853.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_98d000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: a0417211fe079eaeb0264e6dfae53a8186daccb1d3b2b2b563d889284b5d45b4
                                                                                  • Instruction ID: a6ba320570b42a3e83906018c9db43b8146455fa822aa488570e91eccd0c7658
                                                                                  • Opcode Fuzzy Hash: a0417211fe079eaeb0264e6dfae53a8186daccb1d3b2b2b563d889284b5d45b4
                                                                                  • Instruction Fuzzy Hash: 012192755093C08FCB02CF20D990715BF71EB46314F29C5DAD8498B697C33AD80ACB62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359555554.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_97d000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: f21b28fad4208f8a7773c4da12b744b29c369e0cd12ff14c60c0cef6af4301ee
                                                                                  • Instruction ID: a79c4448e30a064e4280c3f69f3e3eba82421f190b2c329e4649e1d6cd1a9ad3
                                                                                  • Opcode Fuzzy Hash: f21b28fad4208f8a7773c4da12b744b29c369e0cd12ff14c60c0cef6af4301ee
                                                                                  • Instruction Fuzzy Hash: 2911D376404280DFCB15CF10D5C4B16BF71FF98324F28C6A9E8494B61AC336D856CBA1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359604853.000000000098D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0098D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_98d000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: fe9a0dd81ef1aaa8884096262e193c6d7ada8b10660d0bdcffad81c4736878b9
                                                                                  • Instruction ID: 5879e08045cb7d10985cbcc4b3dbd05a27b628c2564350a7783d3b4126314f43
                                                                                  • Opcode Fuzzy Hash: fe9a0dd81ef1aaa8884096262e193c6d7ada8b10660d0bdcffad81c4736878b9
                                                                                  • Instruction Fuzzy Hash: 8711B875904280DFDB02DF10C5C0B15BBB1FB88324F28C6AED8494B796C33AD84ACB62
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359555554.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_97d000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: e2aef5e02df0850c831e73046175074ac28fcb8002c840ec518a86cc65cb8df4
                                                                                  • Instruction ID: d6771ec106dedc67026d7bff1a99bae811951407d160f429d30a5ab64afc5ee3
                                                                                  • Opcode Fuzzy Hash: e2aef5e02df0850c831e73046175074ac28fcb8002c840ec518a86cc65cb8df4
                                                                                  • Instruction Fuzzy Hash: 7C01FCB20093809AE7144E15CDC4B66BBECDF41778F18C55EED085B246D3799C44CAB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%

                                                                                  Memory Dump Source
                                                                                  • Source File: 00000002.00000002.359555554.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                                                                  Joe Sandbox IDA Plugin
                                                                                  • Snapshot File: hcaresult_2_2_97d000_WdFVsOe.jbxd
                                                                                  Similarity
                                                                                  • API ID:
                                                                                  • String ID:
                                                                                  • API String ID:
                                                                                  • Opcode ID: 723ce19ad4ab4755626bc827cb8689c600260d76e667833817f8a07d0c548147
                                                                                  • Instruction ID: cc052731d3f58f13678a9aaaee0aa3b5e1e7064d7e919cc7ac1ef1d10d55ea6d
                                                                                  • Opcode Fuzzy Hash: 723ce19ad4ab4755626bc827cb8689c600260d76e667833817f8a07d0c548147
                                                                                  • Instruction Fuzzy Hash: 1BF062B24052849AE7148E1ACC84B62FFACEF91774F18C45AED085B286D3799C44CAB1
                                                                                  Uniqueness

                                                                                  Uniqueness Score: -1.00%