Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
wrong bank details.exe

Overview

General Information

Sample name:wrong bank details.exe
Analysis ID:1528126
MD5:67a9a9b047b1e4f4d70930d8fd2142ad
SHA1:269a60f8300a7b449c9cdc54a1470eefc0e192fb
SHA256:a750777345fce604f483adfbe40e5f0d4c0582e5536c273675d7fd1002e84c5d
Tags:exeMassLogger
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected Telegram RAT
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • wrong bank details.exe (PID: 4992 cmdline: "C:\Users\user\Desktop\wrong bank details.exe" MD5: 67A9A9B047B1E4F4D70930D8FD2142AD)
    • wrong bank details.exe (PID: 6236 cmdline: "C:\Users\user\Desktop\wrong bank details.exe" MD5: 67A9A9B047B1E4F4D70930D8FD2142AD)
    • wrong bank details.exe (PID: 616 cmdline: "C:\Users\user\Desktop\wrong bank details.exe" MD5: 67A9A9B047B1E4F4D70930D8FD2142AD)
  • cleanup
{"C2 url": "https://api.telegram.org/bot8012948610:AAH4T2bfY_PPyXgKFGVw8rmhjBzj3nREYAE/sendMessage"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xf7bf:$a1: get_encryptedPassword
        • 0xfae7:$a2: get_encryptedUsername
        • 0xf55a:$a3: get_timePasswordChanged
        • 0xf67b:$a4: get_passwordField
        • 0xf7d5:$a5: set_encryptedPassword
        • 0x11131:$a7: get_logins
        • 0x10de2:$a8: GetOutlookPasswords
        • 0x10bd4:$a9: StartKeylogger
        • 0x11081:$a10: KeyLoggerEventArgs
        • 0x10c31:$a11: KeyLoggerEventArgsEventHandler
        00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 18 entries
          SourceRuleDescriptionAuthorStrings
          0.2.wrong bank details.exe.35c07b0.2.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.wrong bank details.exe.35c07b0.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.wrong bank details.exe.35c07b0.2.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.wrong bank details.exe.35c07b0.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xd37f:$a1: get_encryptedPassword
                • 0xd6a7:$a2: get_encryptedUsername
                • 0xd11a:$a3: get_timePasswordChanged
                • 0xd23b:$a4: get_passwordField
                • 0xd395:$a5: set_encryptedPassword
                • 0xecf1:$a7: get_logins
                • 0xe9a2:$a8: GetOutlookPasswords
                • 0xe794:$a9: StartKeylogger
                • 0xec41:$a10: KeyLoggerEventArgs
                • 0xe7f1:$a11: KeyLoggerEventArgsEventHandler
                0.2.wrong bank details.exe.35c07b0.2.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x12329:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x11827:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x11b35:$a4: \Orbitum\User Data\Default\Login Data
                • 0x1292d:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 20 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-07T15:41:25.284643+020028032742Potentially Bad Traffic192.168.2.649712132.226.8.16980TCP
                2024-10-07T15:41:31.628469+020028032742Potentially Bad Traffic192.168.2.649712132.226.8.16980TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: wrong bank details.exe.616.4.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot8012948610:AAH4T2bfY_PPyXgKFGVw8rmhjBzj3nREYAE/sendMessage"}
                Source: wrong bank details.exeReversingLabs: Detection: 36%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: wrong bank details.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: wrong bank details.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49713 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49719 version: TLS 1.2
                Source: wrong bank details.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: mGVh.pdb source: wrong bank details.exe
                Source: Binary string: mGVh.pdbSHA256 source: wrong bank details.exe
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 00DA5782h4_2_00DA5358
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 00DA51B9h4_2_00DA4F08
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 00DA5782h4_2_00DA56AF
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F41935h4_2_04F415F8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4E778h4_2_04F4E4D0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F40741h4_2_04F40498
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4BF28h4_2_04F4BC80
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F43EF8h4_2_04F43C50
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4DEC8h4_2_04F4DC20
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4D088h4_2_04F4CDE0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4F028h4_2_04F4ED80
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F40FF1h4_2_04F40D48
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4C7D8h4_2_04F4C530
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4A970h4_2_04F4A6C8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4D93Ah4_2_04F4D690
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4F8D8h4_2_04F4F630
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4A0C0h4_2_04F49E18
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F43AA0h4_2_04F437F8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4B220h4_2_04F4AF78
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F431F0h4_2_04F42F48
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F40B99h4_2_04F408F0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4C380h4_2_04F4C0D8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F44350h4_2_04F440A8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4E320h4_2_04F4E078
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F402E9h4_2_04F40040
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4BAD0h4_2_04F4B828
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4F480h4_2_04F4F1D8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F41449h4_2_04F411A0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4CC30h4_2_04F4C988
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4EBD0h4_2_04F4E928
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F42D98h4_2_04F42AF0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4FD30h4_2_04F4FA88
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4A518h4_2_04F4A270
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4D4E0h4_2_04F4D238
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4B678h4_2_04F4B3D0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F43648h4_2_04F433A0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4x nop then jmp 04F4ADC8h4_2_04F4AB20

                Networking

                barindex
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49712 -> 132.226.8.169:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49713 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.orgd
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.godaddy.com/repository/0
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certificates.godaddy.com/repository/gdig2.crt0
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://certs.godaddy.com/repository/1301
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002A82000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002A21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: wrong bank details.exe, 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.godaddy.com/gdig2s1-19134.crl0
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.godaddy.com/gdroot-g2.crl0F
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.godaddy.com/gdroot.crl0F
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.godaddy.com/0
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.godaddy.com/02
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.godaddy.com/05
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002ABB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002ABB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002A21000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: wrong bank details.exe, 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot8012948610:AAH4T2bfY_PPyXgKFGVw8rmhjBzj3nREYAE/sendDocument?chat_id=4039
                Source: wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://certs.godaddy.com/repository/0
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: wrong bank details.exe, 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33d
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.6:49719 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode
                Source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, UltraSpeed.cs.Net Code: VKCodeToUnicode

                System Summary

                barindex
                Source: 0.2.wrong bank details.exe.35c07b0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.wrong bank details.exe.35c07b0.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 4.2.wrong bank details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 4.2.wrong bank details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.wrong bank details.exe.35a9990.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.wrong bank details.exe.35a9990.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: wrong bank details.exe PID: 4992, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: wrong bank details.exe PID: 616, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess Stats: CPU usage > 49%
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_023CD55C0_2_023CD55C
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_06CA8DF00_2_06CA8DF0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_06CA47200_2_06CA4720
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_06CA30780_2_06CA3078
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_06CA4F900_2_06CA4F90
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_06CA4F7F0_2_06CA4F7F
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_06CA2C400_2_06CA2C40
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_06CA4B580_2_06CA4B58
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DAC1684_2_00DAC168
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DA27B94_2_00DA27B9
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DACAB04_2_00DACAB0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DA2DD14_2_00DA2DD1
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DA7E684_2_00DA7E68
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DA4F084_2_00DA4F08
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DAB9E04_2_00DAB9E0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DACAAF4_2_00DACAAF
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DA4EF84_2_00DA4EF8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DA7E674_2_00DA7E67
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F41C584_2_04F41C58
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F415F84_2_04F415F8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F445004_2_04F44500
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F477704_2_04F47770
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F469984_2_04F46998
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4E4D04_2_04F4E4D0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4E4C04_2_04F4E4C0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F49C904_2_04F49C90
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F404984_2_04F40498
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4BC804_2_04F4BC80
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F404894_2_04F40489
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4BC714_2_04F4BC71
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F43C504_2_04F43C50
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F43C424_2_04F43C42
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4DC204_2_04F4DC20
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4DC114_2_04F4DC11
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4CDE04_2_04F4CDE0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F415EA4_2_04F415EA
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4CDD04_2_04F4CDD0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4ED804_2_04F4ED80
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4ED704_2_04F4ED70
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F40D484_2_04F40D48
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4C5304_2_04F4C530
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F40D394_2_04F40D39
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4C5204_2_04F4C520
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4A6C84_2_04F4A6C8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4A6B94_2_04F4A6B9
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4D6904_2_04F4D690
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4D6814_2_04F4D681
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4F6304_2_04F4F630
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4F6204_2_04F4F620
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F49E184_2_04F49E18
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F437F84_2_04F437F8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F437E84_2_04F437E8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4AF784_2_04F4AF78
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4AF684_2_04F4AF68
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F42F484_2_04F42F48
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F42F384_2_04F42F38
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F408F04_2_04F408F0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F408DF4_2_04F408DF
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4C0D84_2_04F4C0D8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4C0CA4_2_04F4C0CA
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F440A84_2_04F440A8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F440984_2_04F44098
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4E0784_2_04F4E078
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4E0684_2_04F4E068
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F400404_2_04F40040
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4B8284_2_04F4B828
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4001F4_2_04F4001F
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4B8184_2_04F4B818
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4F1D84_2_04F4F1D8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4F1C84_2_04F4F1C8
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F411A04_2_04F411A0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4118F4_2_04F4118F
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4C9884_2_04F4C988
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4C97A4_2_04F4C97A
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4E9224_2_04F4E922
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4E9284_2_04F4E928
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F42AF04_2_04F42AF0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F42AE04_2_04F42AE0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4FA884_2_04F4FA88
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4A2704_2_04F4A270
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4FA784_2_04F4FA78
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4A2614_2_04F4A261
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4D2384_2_04F4D238
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4D22A4_2_04F4D22A
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4B3D04_2_04F4B3D0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4B3C14_2_04F4B3C1
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F433A04_2_04F433A0
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F433914_2_04F43391
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F41B4A4_2_04F41B4A
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4AB204_2_04F4AB20
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_04F4AB104_2_04F4AB10
                Source: wrong bank details.exe, 00000000.00000002.2146705585.0000000006C00000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs wrong bank details.exe
                Source: wrong bank details.exe, 00000000.00000000.2103680319.000000000025C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemGVh.exe8 vs wrong bank details.exe
                Source: wrong bank details.exe, 00000000.00000002.2142441399.00000000007DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs wrong bank details.exe
                Source: wrong bank details.exe, 00000000.00000002.2143846738.00000000025DF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs wrong bank details.exe
                Source: wrong bank details.exe, 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs wrong bank details.exe
                Source: wrong bank details.exe, 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTyrone.dll8 vs wrong bank details.exe
                Source: wrong bank details.exe, 00000004.00000002.4550376269.000000000041A000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs wrong bank details.exe
                Source: wrong bank details.exe, 00000004.00000002.4550578170.0000000000AF7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs wrong bank details.exe
                Source: wrong bank details.exeBinary or memory string: OriginalFilenamemGVh.exe8 vs wrong bank details.exe
                Source: wrong bank details.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.wrong bank details.exe.35c07b0.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.wrong bank details.exe.35c07b0.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 4.2.wrong bank details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 4.2.wrong bank details.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.wrong bank details.exe.35a9990.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.wrong bank details.exe.35a9990.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: wrong bank details.exe PID: 4992, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: wrong bank details.exe PID: 616, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: wrong bank details.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, UltraSpeed.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, COVIDPickers.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, bkmHwoyomka5cbrXc4.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, bkmHwoyomka5cbrXc4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, bkmHwoyomka5cbrXc4.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, bkmHwoyomka5cbrXc4.csSecurity API names: _0020.SetAccessControl
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, bkmHwoyomka5cbrXc4.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, bkmHwoyomka5cbrXc4.csSecurity API names: _0020.AddAccessRule
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, OFYmxUvYUEi1tHs4m2.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, OFYmxUvYUEi1tHs4m2.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, OFYmxUvYUEi1tHs4m2.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, OFYmxUvYUEi1tHs4m2.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/1@3/3
                Source: C:\Users\user\Desktop\wrong bank details.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\wrong bank details.exe.logJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMutant created: NULL
                Source: C:\Users\user\Desktop\wrong bank details.exeMutant created: \Sessions\1\BaseNamedObjects\GALWlSTgPdbAZdxHULqK
                Source: wrong bank details.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: wrong bank details.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\wrong bank details.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: wrong bank details.exe, 00000004.00000002.4551831921.0000000002B0E000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B30000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B3D000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B1C000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4552916694.0000000003A4D000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002AFE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: wrong bank details.exeReversingLabs: Detection: 36%
                Source: unknownProcess created: C:\Users\user\Desktop\wrong bank details.exe "C:\Users\user\Desktop\wrong bank details.exe"
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess created: C:\Users\user\Desktop\wrong bank details.exe "C:\Users\user\Desktop\wrong bank details.exe"
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess created: C:\Users\user\Desktop\wrong bank details.exe "C:\Users\user\Desktop\wrong bank details.exe"
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess created: C:\Users\user\Desktop\wrong bank details.exe "C:\Users\user\Desktop\wrong bank details.exe"Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess created: C:\Users\user\Desktop\wrong bank details.exe "C:\Users\user\Desktop\wrong bank details.exe"Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: wrong bank details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: wrong bank details.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: wrong bank details.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: mGVh.pdb source: wrong bank details.exe
                Source: Binary string: mGVh.pdbSHA256 source: wrong bank details.exe

                Data Obfuscation

                barindex
                Source: wrong bank details.exe, Form1.cs.Net Code: InitializeComponent contains xor as well as GetObject
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, bkmHwoyomka5cbrXc4.cs.Net Code: AFCSnSjktJ System.Reflection.Assembly.Load(byte[])
                Source: 0.2.wrong bank details.exe.25b4924.0.raw.unpack, RZ.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, bkmHwoyomka5cbrXc4.cs.Net Code: AFCSnSjktJ System.Reflection.Assembly.Load(byte[])
                Source: 0.2.wrong bank details.exe.7310000.5.raw.unpack, RZ.cs.Net Code: System.Reflection.Assembly.Load(byte[])
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_023CF530 pushfd ; iretd 0_2_023CF531
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 0_2_06CA9A88 push es; ret 0_2_06CA9A94
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DAF273 push ebp; retf 4_2_00DAF281
                Source: wrong bank details.exeStatic PE information: section name: .text entropy: 7.983800868512996
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, FCqjw3DuGTe57JV7o2.csHigh entropy of concatenated method names: 'vWonCjkyZ', 'iauGJCLLa', 'gPS3ptrIL', 'o1aahSaZm', 'FgCfwSfxR', 'KwmRMtUSF', 'WKr7usgKtalTtZBv9r', 'XGsNngx173ARwHDe2C', 'GhCIL6HES', 'XvqO5quiG'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, G3WmFiEX3cpCgE1upC.csHigh entropy of concatenated method names: 'eKto91fcgC', 'zqaojJreAG', 'HEQonxb1k4', 'VIpoGvKOy8', 'MO8o3tckt4', 'WdCoawOAJ3', 'IwBofk20Jf', 'RbSoRMoVrp', 'ci8hZYtwxqZ3A3FG7nZ', 'juZLUUtWvkV6nVB75S2'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, iXnLdLW7CcvgHiapVT1.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bG1OClAMZs', 'NCeOdrXaQc', 'ibGOK3CK0w', 'GhNOZJAX88', 'LfFOgeXx4J', 'ibxObWFqas', 'WxbOciFSYW'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, prGmTPNv2QCHHgMW6l.csHigh entropy of concatenated method names: 'yM1hjE8hSO', 'I5RhrRyAPo', 'j0yhnFlcRf', 'w4PhGWk9rH', 'vixhitXftj', 'Y8nh3yUtuZ', 'LkZha8mdOB', 'IylhvklJYq', 'eTThfVSD6V', 'vZmhRkcmIh'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, T0dkFJeDVXcxq2Gt99.csHigh entropy of concatenated method names: 'hDh4Waw6n7', 'Fjk47CydyT', 'YXv4SYDoR3', 'Mla4lifw6v', 'l6M4QMeUWS', 'zQo4pN1N3X', 'KlU4oZvI0g', 'LpKIcleGXL', 'x4qIsUcGGs', 'bHiIVFEa1F'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, XbdTaBRH6qOnTxoik4.csHigh entropy of concatenated method names: 'TSOpisbLac', 'jahpavJ86y', 'D2g12ViFIS', 'StC1E7WS6K', 'zU71XpfEUv', 'vwp15XHurb', 'gRp1moohJE', 'aSs1YdrykY', 'xDA1NnfTC4', 'max1JwWxdD'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, ppqoTmVfKVPplix4TV.csHigh entropy of concatenated method names: 'scYIFo6lvZ', 'oikIqPVuSw', 'iUHI2Y8psd', 'dhHIE5SRH8', 'lwSICHxcPy', 'inJIXPAvUs', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, dX3VNQZgEhPrW2sijw.csHigh entropy of concatenated method names: 'LHdx6ENZed', 'YfJxwvfpwN', 'ToString', 'rp7xl2n0cQ', 'T2FxQgoUKC', 'tDWx1kE1NX', 'Abfxp1n2SQ', 'iqoxovKpVS', 'WPbxhUWCjw', 'mKDxyUD8yG'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, jnga2ebRKnaelFULRW.csHigh entropy of concatenated method names: 'L1CxsPyc3a', 's7jxeluoHx', 'xtwIPQn25B', 'TqxIWJUj3g', 'kfRx0voqRj', 'csrxL9DhJ8', 'iRXxUiZJlU', 'FEZxCHeGe4', 'DPJxdHG17I', 'YwPxKvdX77'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, XK3khbUj96ZQnftMaD.csHigh entropy of concatenated method names: 'f5I8vy14aj', 'DfZ8fnDOlM', 'bg08FPhr6E', 'RP08qk9cMG', 'BtE8EI6YMC', 'HE98Xr58pM', 'MJ18mHBEPH', 'GUL8YouRuO', 'MFM8JxccBT', 'bC48053SBG'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, juXfEuWPXpwx3Zh8Pp2.csHigh entropy of concatenated method names: 'h5V4jiYGRN', 'f7v4r5HP7p', 'CKg4no94bt', 'iZW4GHfutQ', 'ETX4itf216', 'lI843nCUA3', 'dml4akHTrq', 'ct04v4xg1a', 'Xsu4fIbp99', 'Rwa4Rg9JUf'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, bAqFSIsBuZUb5q20YZ.csHigh entropy of concatenated method names: 'hJMIl3poHu', 'SswIQHdhTI', 'hLdI1cCW98', 'S3mIpmsBlA', 'Xu6IoBOdHQ', 'YcSIhsy1w0', 'XknIydWExA', 'ypwIMUN3QN', 'pVhI67f24s', 'kVfIwoQ6D3'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, waLIt8zE22aqy7b4jc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Mpi48uYbDJ', 'E1D4BcjFDL', 'DuF4HkfQXQ', 'yec4x78ae7', 'UJ34I2NKuP', 'oUr44TIJFd', 'zhc4OKUwV3'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, r6CW5PF3YwoVTIIo2o.csHigh entropy of concatenated method names: 'FnRotmC7Nl', 'GlCoQm2jTI', 'T8SopBgp0x', 'eVjohimVP2', 'r8aoymbXhr', 'VX7pgpPeJq', 'N1xpb6DCYC', 'Y9wpcLtlbB', 'lI0ps2NxQC', 'fRSpVH375U'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, JShcRmmsjlsvFAs170.csHigh entropy of concatenated method names: 'NPPhlqWFHJ', 'RlHh198bnL', 'akLho7hrnR', 'SKMoeGQ1LQ', 'AlZoz2IASc', 'lX3hPK3vXi', 'mguhWRnyVF', 'SxrhDBnati', 'VIAh79HXfU', 'sLghSixDMg'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, Ytu2QfSYmXelK4IS1S.csHigh entropy of concatenated method names: 'kx0WhFYmxU', 'MUEWyi1tHs', 'vkmW6B9KDV', 'gBGWwfVbdT', 'qoiWBk446C', 'b5PWH3YwoV', 'uYvsdjjXMTZsD2QDwJ', 'doAHoXOMttJBKiZHpW', 'PqWKHcuyHxDvOPIbEn', 'LgmWW3RZf0'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, VqGKaRWD0ybbyhTZIEb.csHigh entropy of concatenated method names: 'QCiOjiEQi0', 'evYOr1GbpS', 'gICOnM04g9', 'aiBKdjb5UEI2LW7XwRo', 'McrjlJbL5mgJlCxx83d', 'ncS03wbBUYiwkYmVJ2x', 'O37s8nbzcFV9WYyekOI', 'e7kv18DeQt0xuXCYVxF'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, hlvhouQiIC1cE3H005.csHigh entropy of concatenated method names: 'Dispose', 't7bWVPT2YJ', 'IG3DqLII6K', 'xn5ssaJYoY', 'qWAWeqFSIB', 'wZUWzb5q20', 'ProcessDialogKey', 'LZHDPpqoTm', 'EKVDWPplix', 'rTVDDK0dkF'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, OFYmxUvYUEi1tHs4m2.csHigh entropy of concatenated method names: 'dcFQCl8k0N', 'HnlQd5Sdp5', 'PgvQKeMav5', 'aodQZV17eE', 'SpEQgDggyq', 'zknQbN2ulp', 'MSlQc5Cwui', 'FRMQsIuJB8', 'ReWQViWfHf', 'u6bQelUR1O'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, bkmHwoyomka5cbrXc4.csHigh entropy of concatenated method names: 'MZV7twfIZt', 'Tpd7laAamE', 'KbG7QMx4aZ', 'ytV71C4YwC', 'cYD7pVbNYn', 'udj7oNjwdq', 'z7t7hV5CKf', 'wZU7yFgTO3', 'kgQ7Ma1m3E', 'VRH763mBxC'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, D6XisAfkmB9KDVQBGf.csHigh entropy of concatenated method names: 'MYy1Gjc7yV', 'cRI13mXfZG', 't6F1vumBCs', 'gWk1fbCk3B', 'pFi1B4denc', 'ROc1Hkifmy', 'kI21xXo9fn', 'rQH1IM9hg6', 'QHF14uExrQ', 'i871OgMXCL'
                Source: 0.2.wrong bank details.exe.6c00000.4.raw.unpack, vgdJJ0COQaS2onvOO3.csHigh entropy of concatenated method names: 'RNvBJXZoWk', 'REBBLp6KKc', 'tdHBCu9vE1', 'icOBdokLCh', 'LkQBqcTdXb', 'AD4B2FwS3e', 'DVBBEI7JxT', 'LgxBX2FtbB', 'vJLB598TdX', 'oaOBmfvhA1'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, FCqjw3DuGTe57JV7o2.csHigh entropy of concatenated method names: 'vWonCjkyZ', 'iauGJCLLa', 'gPS3ptrIL', 'o1aahSaZm', 'FgCfwSfxR', 'KwmRMtUSF', 'WKr7usgKtalTtZBv9r', 'XGsNngx173ARwHDe2C', 'GhCIL6HES', 'XvqO5quiG'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, G3WmFiEX3cpCgE1upC.csHigh entropy of concatenated method names: 'eKto91fcgC', 'zqaojJreAG', 'HEQonxb1k4', 'VIpoGvKOy8', 'MO8o3tckt4', 'WdCoawOAJ3', 'IwBofk20Jf', 'RbSoRMoVrp', 'ci8hZYtwxqZ3A3FG7nZ', 'juZLUUtWvkV6nVB75S2'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, iXnLdLW7CcvgHiapVT1.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'bG1OClAMZs', 'NCeOdrXaQc', 'ibGOK3CK0w', 'GhNOZJAX88', 'LfFOgeXx4J', 'ibxObWFqas', 'WxbOciFSYW'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, prGmTPNv2QCHHgMW6l.csHigh entropy of concatenated method names: 'yM1hjE8hSO', 'I5RhrRyAPo', 'j0yhnFlcRf', 'w4PhGWk9rH', 'vixhitXftj', 'Y8nh3yUtuZ', 'LkZha8mdOB', 'IylhvklJYq', 'eTThfVSD6V', 'vZmhRkcmIh'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, T0dkFJeDVXcxq2Gt99.csHigh entropy of concatenated method names: 'hDh4Waw6n7', 'Fjk47CydyT', 'YXv4SYDoR3', 'Mla4lifw6v', 'l6M4QMeUWS', 'zQo4pN1N3X', 'KlU4oZvI0g', 'LpKIcleGXL', 'x4qIsUcGGs', 'bHiIVFEa1F'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, XbdTaBRH6qOnTxoik4.csHigh entropy of concatenated method names: 'TSOpisbLac', 'jahpavJ86y', 'D2g12ViFIS', 'StC1E7WS6K', 'zU71XpfEUv', 'vwp15XHurb', 'gRp1moohJE', 'aSs1YdrykY', 'xDA1NnfTC4', 'max1JwWxdD'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, ppqoTmVfKVPplix4TV.csHigh entropy of concatenated method names: 'scYIFo6lvZ', 'oikIqPVuSw', 'iUHI2Y8psd', 'dhHIE5SRH8', 'lwSICHxcPy', 'inJIXPAvUs', 'Next', 'Next', 'Next', 'NextBytes'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, dX3VNQZgEhPrW2sijw.csHigh entropy of concatenated method names: 'LHdx6ENZed', 'YfJxwvfpwN', 'ToString', 'rp7xl2n0cQ', 'T2FxQgoUKC', 'tDWx1kE1NX', 'Abfxp1n2SQ', 'iqoxovKpVS', 'WPbxhUWCjw', 'mKDxyUD8yG'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, jnga2ebRKnaelFULRW.csHigh entropy of concatenated method names: 'L1CxsPyc3a', 's7jxeluoHx', 'xtwIPQn25B', 'TqxIWJUj3g', 'kfRx0voqRj', 'csrxL9DhJ8', 'iRXxUiZJlU', 'FEZxCHeGe4', 'DPJxdHG17I', 'YwPxKvdX77'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, XK3khbUj96ZQnftMaD.csHigh entropy of concatenated method names: 'f5I8vy14aj', 'DfZ8fnDOlM', 'bg08FPhr6E', 'RP08qk9cMG', 'BtE8EI6YMC', 'HE98Xr58pM', 'MJ18mHBEPH', 'GUL8YouRuO', 'MFM8JxccBT', 'bC48053SBG'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, juXfEuWPXpwx3Zh8Pp2.csHigh entropy of concatenated method names: 'h5V4jiYGRN', 'f7v4r5HP7p', 'CKg4no94bt', 'iZW4GHfutQ', 'ETX4itf216', 'lI843nCUA3', 'dml4akHTrq', 'ct04v4xg1a', 'Xsu4fIbp99', 'Rwa4Rg9JUf'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, bAqFSIsBuZUb5q20YZ.csHigh entropy of concatenated method names: 'hJMIl3poHu', 'SswIQHdhTI', 'hLdI1cCW98', 'S3mIpmsBlA', 'Xu6IoBOdHQ', 'YcSIhsy1w0', 'XknIydWExA', 'ypwIMUN3QN', 'pVhI67f24s', 'kVfIwoQ6D3'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, waLIt8zE22aqy7b4jc.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'Mpi48uYbDJ', 'E1D4BcjFDL', 'DuF4HkfQXQ', 'yec4x78ae7', 'UJ34I2NKuP', 'oUr44TIJFd', 'zhc4OKUwV3'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, r6CW5PF3YwoVTIIo2o.csHigh entropy of concatenated method names: 'FnRotmC7Nl', 'GlCoQm2jTI', 'T8SopBgp0x', 'eVjohimVP2', 'r8aoymbXhr', 'VX7pgpPeJq', 'N1xpb6DCYC', 'Y9wpcLtlbB', 'lI0ps2NxQC', 'fRSpVH375U'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, JShcRmmsjlsvFAs170.csHigh entropy of concatenated method names: 'NPPhlqWFHJ', 'RlHh198bnL', 'akLho7hrnR', 'SKMoeGQ1LQ', 'AlZoz2IASc', 'lX3hPK3vXi', 'mguhWRnyVF', 'SxrhDBnati', 'VIAh79HXfU', 'sLghSixDMg'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, Ytu2QfSYmXelK4IS1S.csHigh entropy of concatenated method names: 'kx0WhFYmxU', 'MUEWyi1tHs', 'vkmW6B9KDV', 'gBGWwfVbdT', 'qoiWBk446C', 'b5PWH3YwoV', 'uYvsdjjXMTZsD2QDwJ', 'doAHoXOMttJBKiZHpW', 'PqWKHcuyHxDvOPIbEn', 'LgmWW3RZf0'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, VqGKaRWD0ybbyhTZIEb.csHigh entropy of concatenated method names: 'QCiOjiEQi0', 'evYOr1GbpS', 'gICOnM04g9', 'aiBKdjb5UEI2LW7XwRo', 'McrjlJbL5mgJlCxx83d', 'ncS03wbBUYiwkYmVJ2x', 'O37s8nbzcFV9WYyekOI', 'e7kv18DeQt0xuXCYVxF'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, hlvhouQiIC1cE3H005.csHigh entropy of concatenated method names: 'Dispose', 't7bWVPT2YJ', 'IG3DqLII6K', 'xn5ssaJYoY', 'qWAWeqFSIB', 'wZUWzb5q20', 'ProcessDialogKey', 'LZHDPpqoTm', 'EKVDWPplix', 'rTVDDK0dkF'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, OFYmxUvYUEi1tHs4m2.csHigh entropy of concatenated method names: 'dcFQCl8k0N', 'HnlQd5Sdp5', 'PgvQKeMav5', 'aodQZV17eE', 'SpEQgDggyq', 'zknQbN2ulp', 'MSlQc5Cwui', 'FRMQsIuJB8', 'ReWQViWfHf', 'u6bQelUR1O'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, bkmHwoyomka5cbrXc4.csHigh entropy of concatenated method names: 'MZV7twfIZt', 'Tpd7laAamE', 'KbG7QMx4aZ', 'ytV71C4YwC', 'cYD7pVbNYn', 'udj7oNjwdq', 'z7t7hV5CKf', 'wZU7yFgTO3', 'kgQ7Ma1m3E', 'VRH763mBxC'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, D6XisAfkmB9KDVQBGf.csHigh entropy of concatenated method names: 'MYy1Gjc7yV', 'cRI13mXfZG', 't6F1vumBCs', 'gWk1fbCk3B', 'pFi1B4denc', 'ROc1Hkifmy', 'kI21xXo9fn', 'rQH1IM9hg6', 'QHF14uExrQ', 'i871OgMXCL'
                Source: 0.2.wrong bank details.exe.35e2390.1.raw.unpack, vgdJJ0COQaS2onvOO3.csHigh entropy of concatenated method names: 'RNvBJXZoWk', 'REBBLp6KKc', 'tdHBCu9vE1', 'icOBdokLCh', 'LkQBqcTdXb', 'AD4B2FwS3e', 'DVBBEI7JxT', 'LgxBX2FtbB', 'vJLB598TdX', 'oaOBmfvhA1'
                Source: C:\Users\user\Desktop\wrong bank details.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 4992, type: MEMORYSTR
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: 2380000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: 2580000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: 4580000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: 7440000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: 6F30000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: 8440000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: 9440000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: DA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: 2A20000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: 2860000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599653Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599546Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599000Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598671Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598343Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597796Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597468Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597359Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597250Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597140Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597014Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596906Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596796Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596468Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596359Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596249Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596140Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596030Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595921Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595811Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595703Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595593Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595484Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595375Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595265Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595156Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595043Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 594937Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 594828Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 594718Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 594609Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeWindow / User API: threadDelayed 1774Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeWindow / User API: threadDelayed 8090Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 3992Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 2548Thread sleep count: 1774 > 30Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -599875s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 2548Thread sleep count: 8090 > 30Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -599765s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -599653s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -599546s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -599437s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -599328s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -599218s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -599109s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -599000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -598890s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -598781s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -598671s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -598562s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -598453s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -598343s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -598234s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -598125s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -598015s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -597906s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -597796s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -597687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -597578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -597468s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -597359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -597250s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -597140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -597014s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -596906s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -596796s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -596687s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -596578s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -596468s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -596359s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -596249s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -596140s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -596030s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -595921s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -595811s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -595703s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -595593s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -595484s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -595375s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -595265s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -595156s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -595043s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -594937s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -594828s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -594718s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exe TID: 6480Thread sleep time: -594609s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599653Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599546Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599437Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599218Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599109Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 599000Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598890Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598781Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598671Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598562Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598453Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598343Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598234Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598125Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 598015Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597906Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597796Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597687Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597578Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597468Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597359Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597250Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597140Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 597014Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596906Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596796Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596687Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596578Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596468Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596359Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596249Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596140Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 596030Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595921Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595811Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595703Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595593Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595484Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595375Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595265Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595156Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 595043Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 594937Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 594828Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 594718Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeThread delayed: delay time: 594609Jump to behavior
                Source: wrong bank details.exe, 00000004.00000002.4550726878.0000000000B67000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeCode function: 4_2_00DAC168 LdrInitializeThunk,LdrInitializeThunk,4_2_00DAC168
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, UltraSpeed.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text9 + "\\mozglue.dll"))
                Source: C:\Users\user\Desktop\wrong bank details.exeMemory written: C:\Users\user\Desktop\wrong bank details.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess created: C:\Users\user\Desktop\wrong bank details.exe "C:\Users\user\Desktop\wrong bank details.exe"Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeProcess created: C:\Users\user\Desktop\wrong bank details.exe "C:\Users\user\Desktop\wrong bank details.exe"Jump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Users\user\Desktop\wrong bank details.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Users\user\Desktop\wrong bank details.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wrong bank details.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 4992, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 616, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wrong bank details.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 4992, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 616, type: MEMORYSTR
                Source: C:\Users\user\Desktop\wrong bank details.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\wrong bank details.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wrong bank details.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 4992, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 616, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wrong bank details.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 4992, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 616, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.wrong bank details.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35a9990.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.wrong bank details.exe.35c07b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 4992, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: wrong bank details.exe PID: 616, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                Native API
                1
                DLL Side-Loading
                111
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Query Registry
                Remote Services1
                Email Collection
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                1
                Input Capture
                1
                Security Software Discovery
                Remote Desktop Protocol1
                Input Capture
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
                Process Injection
                NTDS31
                Virtualization/Sandbox Evasion
                Distributed Component Object Model1
                Data from Local System
                2
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                Application Window Discovery
                SSHKeylogging13
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
                Obfuscated Files or Information
                Cached Domain Credentials1
                System Network Configuration Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Software Packing
                DCSync13
                System Information Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                wrong bank details.exe37%ReversingLabsByteCode-MSIL.Trojan.CrypterX
                wrong bank details.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://checkip.dyndns.org0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                http://reallyfreegeoip.org0%URL Reputationsafe
                https://reallyfreegeoip.org0%URL Reputationsafe
                http://checkip.dyndns.com0%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                https://reallyfreegeoip.org/xml/0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.96.3
                truetrue
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truetrue
                    unknown
                    checkip.dyndns.com
                    132.226.8.169
                    truefalse
                      unknown
                      checkip.dyndns.org
                      unknown
                      unknowntrue
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.33false
                        • URL Reputation: safe
                        unknown
                        http://checkip.dyndns.org/false
                        • URL Reputation: safe
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://api.telegram.orgwrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmptrue
                          unknown
                          https://api.telegram.org/botwrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmptrue
                            unknown
                            http://certificates.godaddy.com/repository/0wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://certs.godaddy.com/repository/1301wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                http://reallyfreegeoip.orgdwrong bank details.exe, 00000004.00000002.4551831921.0000000002ABB000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://crl.godaddy.com/gdig2s1-19134.crl0wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    http://checkip.dyndns.orgwrong bank details.exe, 00000004.00000002.4551831921.0000000002A82000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    https://api.telegram.org/bot8012948610:AAH4T2bfY_PPyXgKFGVw8rmhjBzj3nREYAE/sendDocument?chat_id=4039wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                      unknown
                                      https://certs.godaddy.com/repository/0wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                        unknown
                                        https://reallyfreegeoip.org/xml/8.46.123.33lwrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                          unknown
                                          http://crl.godaddy.com/gdroot-g2.crl0Fwrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            http://checkip.dyndns.comdwrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                              unknown
                                              https://reallyfreegeoip.org/xml/8.46.123.33dwrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                unknown
                                                http://checkip.dyndns.org/qwrong bank details.exe, 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                • URL Reputation: safe
                                                unknown
                                                http://crl.godaddy.com/gdroot.crl0Fwrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  unknown
                                                  http://reallyfreegeoip.orgwrong bank details.exe, 00000004.00000002.4551831921.0000000002ABB000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  • URL Reputation: safe
                                                  unknown
                                                  http://checkip.dyndns.orgdwrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    unknown
                                                    https://reallyfreegeoip.orgwrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • URL Reputation: safe
                                                    unknown
                                                    http://api.telegram.orgdwrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      http://checkip.dyndns.comwrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      • URL Reputation: safe
                                                      unknown
                                                      http://api.telegram.orgwrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://certificates.godaddy.com/repository/gdig2.crt0wrong bank details.exe, 00000004.00000002.4553998416.0000000006110000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550726878.0000000000BB2000.00000004.00000020.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          unknown
                                                          http://checkip.dyndns.org/dwrong bank details.exe, 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            unknown
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namewrong bank details.exe, 00000004.00000002.4551831921.0000000002A21000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            • URL Reputation: safe
                                                            unknown
                                                            https://api.telegram.org/bot-/sendDocument?chat_id=wrong bank details.exe, 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                              unknown
                                                              https://reallyfreegeoip.org/xml/wrong bank details.exe, 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, wrong bank details.exe, 00000004.00000002.4551831921.0000000002A9E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • URL Reputation: safe
                                                              unknown
                                                              • No. of IPs < 25%
                                                              • 25% < No. of IPs < 50%
                                                              • 50% < No. of IPs < 75%
                                                              • 75% < No. of IPs
                                                              IPDomainCountryFlagASNASN NameMalicious
                                                              132.226.8.169
                                                              checkip.dyndns.comUnited States
                                                              16989UTMEMUSfalse
                                                              149.154.167.220
                                                              api.telegram.orgUnited Kingdom
                                                              62041TELEGRAMRUtrue
                                                              188.114.96.3
                                                              reallyfreegeoip.orgEuropean Union
                                                              13335CLOUDFLARENETUStrue
                                                              Joe Sandbox version:41.0.0 Charoite
                                                              Analysis ID:1528126
                                                              Start date and time:2024-10-07 15:40:33 +02:00
                                                              Joe Sandbox product:CloudBasic
                                                              Overall analysis duration:0h 7m 46s
                                                              Hypervisor based Inspection enabled:false
                                                              Report type:full
                                                              Cookbook file name:default.jbs
                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                              Number of analysed new started processes analysed:8
                                                              Number of new started drivers analysed:0
                                                              Number of existing processes analysed:0
                                                              Number of existing drivers analysed:0
                                                              Number of injected processes analysed:0
                                                              Technologies:
                                                              • HCA enabled
                                                              • EGA enabled
                                                              • AMSI enabled
                                                              Analysis Mode:default
                                                              Analysis stop reason:Timeout
                                                              Sample name:wrong bank details.exe
                                                              Detection:MAL
                                                              Classification:mal100.troj.spyw.evad.winEXE@5/1@3/3
                                                              EGA Information:
                                                              • Successful, ratio: 100%
                                                              HCA Information:
                                                              • Successful, ratio: 100%
                                                              • Number of executed functions: 69
                                                              • Number of non-executed functions: 40
                                                              Cookbook Comments:
                                                              • Found application associated with file extension: .exe
                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                              • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                              • VT rate limit hit for: wrong bank details.exe
                                                              TimeTypeDescription
                                                              09:41:22API Interceptor11241063x Sleep call for process: wrong bank details.exe modified
                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                              132.226.8.169PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              8038.exeGet hashmaliciousSnake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              Confirmation transfer AGS # 03-10-24.scr.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              MT103-93850.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              StatementXofXaccount.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              TTXAPPLICATION.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              KBGC_1200O000000_98756.docx.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              Updated New Order.xlsGet hashmaliciousSnake KeyloggerBrowse
                                                              • checkip.dyndns.org/
                                                              149.154.167.220z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                                      SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        Yeni Sipari#U015f.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                          COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                                            Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                              Quotation.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                sam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                  188.114.96.3RFQ 245801.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.j88.travel/c24t/?9rm4ULV=iDjdFcjw5QZJ8NeJJL4ZS/2sliUdDJEhqWnTSCKxgeFtQoD7uajT9bZ2+m2NwmP2xDXw&D4hl2=fT-dvVK08nUDKdF
                                                                                  74qgPmarBM.exeGet hashmaliciousPonyBrowse
                                                                                  • kuechenundmehr.com/x.htm
                                                                                  PURCHASE ORDER-6350.exeGet hashmaliciousFormBookBrowse
                                                                                  • www.cc101.pro/ttiz/
                                                                                  http://revexhibition.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                                                                                  • revexhibition.pages.dev/favicon.ico
                                                                                  http://meta.case-page-appeal.eu/community-standard/112225492204863/Get hashmaliciousUnknownBrowse
                                                                                  • meta.case-page-appeal.eu/assets/k9854w4e5136q5a-f2169603.png
                                                                                  http://www.tkmall-wholesale.com/Get hashmaliciousUnknownBrowse
                                                                                  • www.tkmall-wholesale.com/
                                                                                  c1#U09a6.exeGet hashmaliciousUnknownBrowse
                                                                                  • winfileshare.com/ticket_line/llb.php
                                                                                  QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                  • filetransfer.io/data-package/eZFzMENr/download
                                                                                  QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                                                  • filetransfer.io/data-package/eZFzMENr/download
                                                                                  1tstvk3Sls.exeGet hashmaliciousRHADAMANTHYSBrowse
                                                                                  • microsoft-rage.world/Api/v3/qjqzqiiqayjq
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  reallyfreegeoip.orgz1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.97.3
                                                                                  PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.97.3
                                                                                  SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  • 172.67.177.134
                                                                                  8038.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                                                  • 188.114.97.3
                                                                                  #Uc740#Ud589_#Uc0c1#Uc138#Uc815#Ubcf4.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  movimiento_INGDIRECT.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 188.114.97.3
                                                                                  Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.97.3
                                                                                  api.telegram.orgz1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  Yeni Sipari#U015f.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                                  • 149.154.167.220
                                                                                  COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  Quotation.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  sam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                  • 149.154.167.220
                                                                                  checkip.dyndns.comz1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 193.122.130.0
                                                                                  SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  8038.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 132.226.8.169
                                                                                  COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                                                  • 132.226.8.169
                                                                                  #Uc740#Ud589_#Uc0c1#Uc138#Uc815#Ubcf4.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 158.101.44.242
                                                                                  movimiento_INGDIRECT.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 193.122.130.0
                                                                                  Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 193.122.6.168
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  TELEGRAMRUz1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  Yeni Sipari#U015f.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                                  • 149.154.167.220
                                                                                  COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  Quotation.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  sam.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                  • 149.154.167.220
                                                                                  UTMEMUSPO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 132.226.8.169
                                                                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  8038.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 132.226.8.169
                                                                                  COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                                                  • 132.226.8.169
                                                                                  Quotation.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  2i3Lj7a8Gk.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  VX7fQ2wEzC.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  jHSDuYLeUl.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 132.226.247.73
                                                                                  na.htaGet hashmaliciousCobalt Strike, Snake KeyloggerBrowse
                                                                                  • 132.226.8.169
                                                                                  CLOUDFLARENETUSrInvoiceCM60916_xlx.exeGet hashmaliciousFormBookBrowse
                                                                                  • 172.67.133.115
                                                                                  z1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.97.3
                                                                                  file.exeGet hashmaliciousLummaCBrowse
                                                                                  • 188.114.96.3
                                                                                  https://www.masonpost.com:443/cgi-bin/redir?https://ctrk.klclick3.com/l/01J9K8KGETH6JCWEWSWY0Z1M23_0?upn=u001.itvpsDR1UD2k9ruxjm0OAspgqcVOQ2hpn9lpb50VxZJdbi9nOzDV7HSnhKeIcaLQsgzZhAfJ867-2F8IcC-2BBYACBF80J8eA0O7PKeZKrlC1Q54Fj-2FS5ho91OPbLHjsGsZQWTyMbbJfNaQPKh9-2FKW31wr-2BMvAwYD85cdCTmlJyLauY-3D1xqt_Zis0fkz6H88oOTECUjdmAu-2FGkDDLbhQT-2B-2B9-2BD8-2Fn-2BuGRBn47ofPUerdduk-2BghIIr31LJs6iNd0rpuOZI5rlm3TOpkCWZ1eNCAWCuASI4dMP9Tv6jbA2UWTI2YWLmFZqgYeVzSc0Fb4o9iKg-2BzjSlX63m5ZgVPzXZ0W3SrrpOTDVmr8Vwd0xwSjxu9efo9kpJLVs7HOh7Cib6eG0OHldiYrljs5jy-2BsmDgNausa6sMCHSoHHj10FI3IfGuCnAD3e6jEbbsHVD11-2FD9cWADvkKxwETdgNpgixeie55jSwivWDLRKcdIczYG3CyTpA1Y18cj-2FBGLZEHTJvF1rd5yfWClPzV1Xw6x2CQgpVVbtrTE5NXtV8WFomzmraH-2FRE0uCvY#QE5lb19IYWNrZXJAb2ZmaWNlLmNvbQ==Get hashmaliciousUnknownBrowse
                                                                                  • 104.17.94.1
                                                                                  file.exeGet hashmaliciousLummaCBrowse
                                                                                  • 172.67.206.204
                                                                                  https://issuu.com/smart_media/docs/die_welt_wirtschaft/19Get hashmaliciousUnknownBrowse
                                                                                  • 104.18.36.155
                                                                                  Hscni Remittance_8115919700_16831215.htmlGet hashmaliciousTycoon2FABrowse
                                                                                  • 104.17.25.14
                                                                                  PO.docGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  Payment.vbsGet hashmaliciousFormBookBrowse
                                                                                  • 188.114.96.3
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  54328bd36c14bd82ddaa0c04b25ed9adz1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  SM-0230- J - TOOL 10 DEGREE FOR DWT MACHINE-MF5i.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  8038.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  COMPANY PROFILE_pdf.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  #Uc740#Ud589_#Uc0c1#Uc138#Uc815#Ubcf4.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  movimiento_INGDIRECT.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  Pla#U0107anje,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  Quotation.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 188.114.96.3
                                                                                  3b5074b1b5d032e5620f69f9f700ff0ez1PO7311145.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  TEKL#U0130F TALEP VE F#U0130YAT TEKL#U0130F#U0130_xlsx.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  Payment.vbsGet hashmaliciousFormBookBrowse
                                                                                  • 149.154.167.220
                                                                                  PAYMENT SPECIFIKACIJA 364846637-pdf.vbsGet hashmaliciousRemcosBrowse
                                                                                  • 149.154.167.220
                                                                                  https://bono-sicherheitstechniksharefile.btn-ebikes.com/Get hashmaliciousHtmlDropperBrowse
                                                                                  • 149.154.167.220
                                                                                  Portal.msiGet hashmaliciousUnknownBrowse
                                                                                  • 149.154.167.220
                                                                                  http://46.27.141.62Get hashmaliciousUnknownBrowse
                                                                                  • 149.154.167.220
                                                                                  rREQUESTFORQUOTE-INQUIRY87278.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                                                  • 149.154.167.220
                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.31726.9623.exeGet hashmaliciousUnknownBrowse
                                                                                  • 149.154.167.220
                                                                                  SecuriteInfo.com.Win64.MalwareX-gen.19388.23445.exeGet hashmaliciousUnknownBrowse
                                                                                  • 149.154.167.220
                                                                                  No context
                                                                                  Process:C:\Users\user\Desktop\wrong bank details.exe
                                                                                  File Type:ASCII text, with CRLF line terminators
                                                                                  Category:dropped
                                                                                  Size (bytes):1216
                                                                                  Entropy (8bit):5.34331486778365
                                                                                  Encrypted:false
                                                                                  SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                                  MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                                  SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                                  SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                                  SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                                  Malicious:true
                                                                                  Reputation:high, very likely benign file
                                                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Entropy (8bit):7.765554913857324
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  File name:wrong bank details.exe
                                                                                  File size:563'200 bytes
                                                                                  MD5:67a9a9b047b1e4f4d70930d8fd2142ad
                                                                                  SHA1:269a60f8300a7b449c9cdc54a1470eefc0e192fb
                                                                                  SHA256:a750777345fce604f483adfbe40e5f0d4c0582e5536c273675d7fd1002e84c5d
                                                                                  SHA512:f63cefa6eb0b9019983e5e5cfddda955b639ae45b842a40c55e0b088500cddd0cf9d223df15fcdf4a069e1cf6244363c647f50538c947c920fea4f8314a6a5c4
                                                                                  SSDEEP:12288:mnf0nZYr6+Tvy+XxpbVsh8FCvWuagIYIHNb8Pqli:mnGZY2+TvlvbVshnvWuaa
                                                                                  TLSH:7CC4F162FAC99A51EC6501FB94757CCC21A15E4DCD8BF2B82ABC791DCC721C2EF88542
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g..............0.................. ........@.. ....................................@................................
                                                                                  Icon Hash:d3d0deeae2f2c6c2
                                                                                  Entrypoint:0x47a39a
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                  Time Stamp:0x6703BDB5 [Mon Oct 7 10:53:41 2024 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                  Instruction
                                                                                  jmp dword ptr [00402000h]
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  add byte ptr [eax], al
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x7a3470x4f.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x7c0000x10e6c.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x8e0000xc.reloc
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x78d4c0x54.text
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x20000x783a00x78400d04247a1ddae5f0ba24017b3525a019dFalse0.9805012344074844data7.983800868512996IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rsrc0x7c0000x10e6c0x11000c5c6dc42bb50a17ee74d536fbab54eecFalse0.07686121323529412data3.811066505218853IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .reloc0x8e0000xc0x2002317be15d3e416249279c83778dbed14False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_ICON0x7c1300x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/m0.06794924878741275
                                                                                  RT_GROUP_ICON0x8c9580x14data1.0
                                                                                  RT_VERSION0x8c96c0x314data0.434010152284264
                                                                                  RT_MANIFEST0x8cc800x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                  DLLImport
                                                                                  mscoree.dll_CorExeMain
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-10-07T15:41:25.284643+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649712132.226.8.16980TCP
                                                                                  2024-10-07T15:41:31.628469+02002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649712132.226.8.16980TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Oct 7, 2024 15:41:24.028033018 CEST4971280192.168.2.6132.226.8.169
                                                                                  Oct 7, 2024 15:41:24.033031940 CEST8049712132.226.8.169192.168.2.6
                                                                                  Oct 7, 2024 15:41:24.033099890 CEST4971280192.168.2.6132.226.8.169
                                                                                  Oct 7, 2024 15:41:24.033277988 CEST4971280192.168.2.6132.226.8.169
                                                                                  Oct 7, 2024 15:41:24.038063049 CEST8049712132.226.8.169192.168.2.6
                                                                                  Oct 7, 2024 15:41:24.850327969 CEST8049712132.226.8.169192.168.2.6
                                                                                  Oct 7, 2024 15:41:24.854067087 CEST4971280192.168.2.6132.226.8.169
                                                                                  Oct 7, 2024 15:41:24.859076977 CEST8049712132.226.8.169192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.229922056 CEST8049712132.226.8.169192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.239499092 CEST49713443192.168.2.6188.114.96.3
                                                                                  Oct 7, 2024 15:41:25.239551067 CEST44349713188.114.96.3192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.239619017 CEST49713443192.168.2.6188.114.96.3
                                                                                  Oct 7, 2024 15:41:25.249792099 CEST49713443192.168.2.6188.114.96.3
                                                                                  Oct 7, 2024 15:41:25.249806881 CEST44349713188.114.96.3192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.284642935 CEST4971280192.168.2.6132.226.8.169
                                                                                  Oct 7, 2024 15:41:25.711002111 CEST44349713188.114.96.3192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.711117029 CEST49713443192.168.2.6188.114.96.3
                                                                                  Oct 7, 2024 15:41:25.721452951 CEST49713443192.168.2.6188.114.96.3
                                                                                  Oct 7, 2024 15:41:25.721474886 CEST44349713188.114.96.3192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.722569942 CEST44349713188.114.96.3192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.769001007 CEST49713443192.168.2.6188.114.96.3
                                                                                  Oct 7, 2024 15:41:25.794189930 CEST49713443192.168.2.6188.114.96.3
                                                                                  Oct 7, 2024 15:41:25.839411974 CEST44349713188.114.96.3192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.904614925 CEST44349713188.114.96.3192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.904855013 CEST44349713188.114.96.3192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.905203104 CEST49713443192.168.2.6188.114.96.3
                                                                                  Oct 7, 2024 15:41:25.955060959 CEST49713443192.168.2.6188.114.96.3
                                                                                  Oct 7, 2024 15:41:31.313124895 CEST4971280192.168.2.6132.226.8.169
                                                                                  Oct 7, 2024 15:41:31.318012953 CEST8049712132.226.8.169192.168.2.6
                                                                                  Oct 7, 2024 15:41:31.579436064 CEST8049712132.226.8.169192.168.2.6
                                                                                  Oct 7, 2024 15:41:31.591154099 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:41:31.591182947 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:41:31.591619015 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:41:31.592119932 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:41:31.592139006 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:41:31.628468990 CEST4971280192.168.2.6132.226.8.169
                                                                                  Oct 7, 2024 15:41:32.226310015 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:41:32.226471901 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:41:32.312577009 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:41:32.328536034 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:41:32.328583956 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:41:32.845371962 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:41:32.849853039 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:41:32.849891901 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:41:32.850657940 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:41:32.850667000 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:41:33.199695110 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:41:33.253464937 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:42:36.579957008 CEST8049712132.226.8.169192.168.2.6
                                                                                  Oct 7, 2024 15:42:36.581547976 CEST4971280192.168.2.6132.226.8.169
                                                                                  Oct 7, 2024 15:43:05.911454916 CEST4971280192.168.2.6132.226.8.169
                                                                                  Oct 7, 2024 15:43:05.911468983 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:43:05.911660910 CEST44349719149.154.167.220192.168.2.6
                                                                                  Oct 7, 2024 15:43:05.911828995 CEST49719443192.168.2.6149.154.167.220
                                                                                  Oct 7, 2024 15:43:05.916390896 CEST8049712132.226.8.169192.168.2.6
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Oct 7, 2024 15:41:24.014233112 CEST5372053192.168.2.61.1.1.1
                                                                                  Oct 7, 2024 15:41:24.022492886 CEST53537201.1.1.1192.168.2.6
                                                                                  Oct 7, 2024 15:41:25.231239080 CEST6488653192.168.2.61.1.1.1
                                                                                  Oct 7, 2024 15:41:25.238895893 CEST53648861.1.1.1192.168.2.6
                                                                                  Oct 7, 2024 15:41:31.583260059 CEST6367553192.168.2.61.1.1.1
                                                                                  Oct 7, 2024 15:41:31.590466976 CEST53636751.1.1.1192.168.2.6
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Oct 7, 2024 15:41:24.014233112 CEST192.168.2.61.1.1.10xf4fcStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:25.231239080 CEST192.168.2.61.1.1.10x4deeStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:31.583260059 CEST192.168.2.61.1.1.10xe733Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Oct 7, 2024 15:41:24.022492886 CEST1.1.1.1192.168.2.60xf4fcNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:24.022492886 CEST1.1.1.1192.168.2.60xf4fcNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:24.022492886 CEST1.1.1.1192.168.2.60xf4fcNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:24.022492886 CEST1.1.1.1192.168.2.60xf4fcNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:24.022492886 CEST1.1.1.1192.168.2.60xf4fcNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:24.022492886 CEST1.1.1.1192.168.2.60xf4fcNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:25.238895893 CEST1.1.1.1192.168.2.60x4deeNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:25.238895893 CEST1.1.1.1192.168.2.60x4deeNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                  Oct 7, 2024 15:41:31.590466976 CEST1.1.1.1192.168.2.60xe733No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                  • reallyfreegeoip.org
                                                                                  • checkip.dyndns.org
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.649712132.226.8.16980616C:\Users\user\Desktop\wrong bank details.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  Oct 7, 2024 15:41:24.033277988 CEST151OUTGET / HTTP/1.1
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                  Host: checkip.dyndns.org
                                                                                  Connection: Keep-Alive
                                                                                  Oct 7, 2024 15:41:24.850327969 CEST272INHTTP/1.1 200 OK
                                                                                  Date: Mon, 07 Oct 2024 13:41:24 GMT
                                                                                  Content-Type: text/html
                                                                                  Content-Length: 103
                                                                                  Connection: keep-alive
                                                                                  Cache-Control: no-cache
                                                                                  Pragma: no-cache
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                                  Oct 7, 2024 15:41:24.854067087 CEST127OUTGET / HTTP/1.1
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                  Host: checkip.dyndns.org
                                                                                  Oct 7, 2024 15:41:25.229922056 CEST272INHTTP/1.1 200 OK
                                                                                  Date: Mon, 07 Oct 2024 13:41:25 GMT
                                                                                  Content-Type: text/html
                                                                                  Content-Length: 103
                                                                                  Connection: keep-alive
                                                                                  Cache-Control: no-cache
                                                                                  Pragma: no-cache
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                                                  Oct 7, 2024 15:41:31.313124895 CEST127OUTGET / HTTP/1.1
                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                  Host: checkip.dyndns.org
                                                                                  Oct 7, 2024 15:41:31.579436064 CEST272INHTTP/1.1 200 OK
                                                                                  Date: Mon, 07 Oct 2024 13:41:31 GMT
                                                                                  Content-Type: text/html
                                                                                  Content-Length: 103
                                                                                  Connection: keep-alive
                                                                                  Cache-Control: no-cache
                                                                                  Pragma: no-cache
                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                                                  TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
                                                                                  Oct 7, 2024 15:41:32.312577009 CEST149.154.167.220443192.168.2.649719CN=api.telegram.org CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USCN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=US OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USSun Mar 24 14:08:48 CET 2024 Tue May 03 09:00:00 CEST 2011 Wed Jan 01 08:00:00 CET 2014 Tue Jun 29 19:06:20 CEST 2004Fri Apr 25 15:08:48 CEST 2025 Sat May 03 09:00:00 CEST 2031 Fri May 30 09:00:00 CEST 2031 Thu Jun 29 19:06:20 CEST 2034771,49196-49195-49200-49199-159-158-49188-49187-49192-49191-49162-49161-49172-49171-157-156-61-60-53-47-10,0-10-11-13-35-23-65281,29-23-24,03b5074b1b5d032e5620f69f9f700ff0e
                                                                                  CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USCN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USTue May 03 09:00:00 CEST 2011Sat May 03 09:00:00 CEST 2031
                                                                                  CN=Go Daddy Root Certificate Authority - G2, O="GoDaddy.com, Inc.", L=Scottsdale, ST=Arizona, C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USWed Jan 01 08:00:00 CET 2014Fri May 30 09:00:00 CEST 2031
                                                                                  OU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USOU=Go Daddy Class 2 Certification Authority, O="The Go Daddy Group, Inc.", C=USTue Jun 29 19:06:20 CEST 2004Thu Jun 29 19:06:20 CEST 2034
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.649713188.114.96.3443616C:\Users\user\Desktop\wrong bank details.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-10-07 13:41:25 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                                                  Host: reallyfreegeoip.org
                                                                                  Connection: Keep-Alive
                                                                                  2024-10-07 13:41:25 UTC678INHTTP/1.1 200 OK
                                                                                  Date: Mon, 07 Oct 2024 13:41:25 GMT
                                                                                  Content-Type: application/xml
                                                                                  Transfer-Encoding: chunked
                                                                                  Connection: close
                                                                                  access-control-allow-origin: *
                                                                                  vary: Accept-Encoding
                                                                                  Cache-Control: max-age=86400
                                                                                  CF-Cache-Status: HIT
                                                                                  Age: 64820
                                                                                  Last-Modified: Sun, 06 Oct 2024 19:41:05 GMT
                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GWcaQPfFHs4QlLERpsTE3iuGAglvyhiKwt%2Bp%2Falonh9m3roL6HzEBlMoMf4L4xg1NfP74ktMyLPNYWPGs7ociN%2FTJNQP%2Fm4etiirgYUFktmveE1pSO4TyZa3D8z2ZpHrCKJKl8F5"}],"group":"cf-nel","max_age":604800}
                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8cee4f048810727d-EWR
                                                                                  2024-10-07 13:41:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                                                  Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                                                  2024-10-07 13:41:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                  Data Ascii: 0


                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:09:41:21
                                                                                  Start date:07/10/2024
                                                                                  Path:C:\Users\user\Desktop\wrong bank details.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\wrong bank details.exe"
                                                                                  Imagebase:0x1e0000
                                                                                  File size:563'200 bytes
                                                                                  MD5 hash:67A9A9B047B1E4F4D70930D8FD2142AD
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2145167177.0000000003676000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2145167177.00000000035A9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:3
                                                                                  Start time:09:41:22
                                                                                  Start date:07/10/2024
                                                                                  Path:C:\Users\user\Desktop\wrong bank details.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Users\user\Desktop\wrong bank details.exe"
                                                                                  Imagebase:0x1f0000
                                                                                  File size:563'200 bytes
                                                                                  MD5 hash:67A9A9B047B1E4F4D70930D8FD2142AD
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:4
                                                                                  Start time:09:41:23
                                                                                  Start date:07/10/2024
                                                                                  Path:C:\Users\user\Desktop\wrong bank details.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\wrong bank details.exe"
                                                                                  Imagebase:0x640000
                                                                                  File size:563'200 bytes
                                                                                  MD5 hash:67A9A9B047B1E4F4D70930D8FD2142AD
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.4550376269.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.4551831921.0000000002B74000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:10.5%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:206
                                                                                    Total number of Limit Nodes:15
                                                                                    execution_graph 19838 6ca8758 19839 6ca88e3 19838->19839 19841 6ca877e 19838->19841 19841->19839 19842 6ca6c58 19841->19842 19843 6ca89d8 PostMessageW 19842->19843 19844 6ca8a44 19843->19844 19844->19841 19845 6ca9b38 19846 6ca9b56 19845->19846 19847 6ca9b60 19845->19847 19850 6ca9b8b 19846->19850 19855 6ca9ba0 19846->19855 19847->19847 19851 6ca9bae 19850->19851 19854 6ca9bcd 19850->19854 19860 6ca9354 19851->19860 19854->19847 19856 6ca9bae 19855->19856 19859 6ca9bcd 19855->19859 19857 6ca9354 CloseHandle 19856->19857 19858 6ca9bc9 19857->19858 19858->19847 19859->19847 19861 6ca9d18 CloseHandle 19860->19861 19862 6ca9bc9 19861->19862 19862->19847 19863 23c4668 19864 23c467a 19863->19864 19865 23c4686 19864->19865 19867 23c4778 19864->19867 19868 23c479d 19867->19868 19872 23c4878 19868->19872 19876 23c4888 19868->19876 19874 23c48af 19872->19874 19873 23c498c 19873->19873 19874->19873 19880 23c44b0 19874->19880 19877 23c48af 19876->19877 19878 23c44b0 CreateActCtxA 19877->19878 19879 23c498c 19877->19879 19878->19879 19881 23c5918 CreateActCtxA 19880->19881 19883 23c59db 19881->19883 19884 6ca647c 19885 6ca6482 19884->19885 19889 6ca7390 19885->19889 19908 6ca7380 19885->19908 19886 6ca64a6 19890 6ca73aa 19889->19890 19898 6ca73ce 19890->19898 19927 6ca7a30 19890->19927 19932 6ca7cd3 19890->19932 19937 6ca7fbc 19890->19937 19941 6ca815f 19890->19941 19946 6ca7e5f 19890->19946 19951 6ca797e 19890->19951 19956 6ca7925 19890->19956 19964 6ca7ce6 19890->19964 19971 6ca7aed 19890->19971 19976 6ca7a0c 19890->19976 19981 6ca7a4e 19890->19981 19985 6ca7c08 19890->19985 19990 6ca80e8 19890->19990 19995 6ca7a95 19890->19995 20000 6ca7d17 19890->20000 20008 6ca7810 19890->20008 19898->19886 19909 6ca7390 19908->19909 19910 6ca73ce 19909->19910 19911 6ca80e8 2 API calls 19909->19911 19912 6ca7c08 2 API calls 19909->19912 19913 6ca7a4e 2 API calls 19909->19913 19914 6ca7a0c 2 API calls 19909->19914 19915 6ca7aed 2 API calls 19909->19915 19916 6ca7ce6 4 API calls 19909->19916 19917 6ca7925 4 API calls 19909->19917 19918 6ca797e 2 API calls 19909->19918 19919 6ca7e5f 2 API calls 19909->19919 19920 6ca815f 2 API calls 19909->19920 19921 6ca7fbc 2 API calls 19909->19921 19922 6ca7cd3 2 API calls 19909->19922 19923 6ca7a30 2 API calls 19909->19923 19924 6ca7810 4 API calls 19909->19924 19925 6ca7d17 4 API calls 19909->19925 19926 6ca7a95 2 API calls 19909->19926 19910->19886 19911->19910 19912->19910 19913->19910 19914->19910 19915->19910 19916->19910 19917->19910 19918->19910 19919->19910 19920->19910 19921->19910 19922->19910 19923->19910 19924->19910 19925->19910 19926->19910 19929 6ca7a3d 19927->19929 19928 6ca82af 20016 6ca57b8 19929->20016 20020 6ca57b0 19929->20020 19933 6ca7ce0 19932->19933 19935 6ca57b8 ResumeThread 19933->19935 19936 6ca57b0 ResumeThread 19933->19936 19934 6ca82af 19935->19934 19936->19934 20024 6ca59f8 19937->20024 20028 6ca5a00 19937->20028 19938 6ca7fea 19938->19898 19942 6ca8160 19941->19942 20032 6ca5868 19942->20032 20036 6ca5860 19942->20036 19943 6ca817b 19948 6ca798a 19946->19948 19947 6ca799c 19947->19898 19948->19947 19949 6ca59f8 WriteProcessMemory 19948->19949 19950 6ca5a00 WriteProcessMemory 19948->19950 19949->19948 19950->19948 19952 6ca798a 19951->19952 19953 6ca799c 19952->19953 19954 6ca59f8 WriteProcessMemory 19952->19954 19955 6ca5a00 WriteProcessMemory 19952->19955 19953->19898 19954->19952 19955->19952 19957 6ca792b 19956->19957 19959 6ca795f 19957->19959 20040 6ca5c88 19957->20040 20044 6ca5c7c 19957->20044 19958 6ca799c 19958->19898 19959->19958 19962 6ca59f8 WriteProcessMemory 19959->19962 19963 6ca5a00 WriteProcessMemory 19959->19963 19962->19959 19963->19959 20048 6ca8540 19964->20048 20053 6ca8531 19964->20053 19965 6ca798a 19966 6ca799c 19965->19966 19967 6ca59f8 WriteProcessMemory 19965->19967 19968 6ca5a00 WriteProcessMemory 19965->19968 19966->19898 19967->19965 19968->19965 19972 6ca7af3 19971->19972 19972->19898 19973 6ca81a7 19972->19973 20066 6ca5ae8 19972->20066 20070 6ca5af0 19972->20070 19977 6ca798a 19976->19977 19978 6ca799c 19977->19978 19979 6ca59f8 WriteProcessMemory 19977->19979 19980 6ca5a00 WriteProcessMemory 19977->19980 19978->19898 19979->19977 19980->19977 19983 6ca59f8 WriteProcessMemory 19981->19983 19984 6ca5a00 WriteProcessMemory 19981->19984 19982 6ca7a76 19982->19898 19983->19982 19984->19982 19986 6ca8160 19985->19986 19988 6ca5868 Wow64SetThreadContext 19986->19988 19989 6ca5860 Wow64SetThreadContext 19986->19989 19987 6ca817b 19988->19987 19989->19987 19991 6ca798a 19990->19991 19991->19990 19992 6ca799c 19991->19992 19993 6ca59f8 WriteProcessMemory 19991->19993 19994 6ca5a00 WriteProcessMemory 19991->19994 19992->19898 19993->19991 19994->19991 19996 6ca7a9b 19995->19996 19996->19898 19997 6ca81a7 19996->19997 19998 6ca5ae8 ReadProcessMemory 19996->19998 19999 6ca5af0 ReadProcessMemory 19996->19999 19998->19996 19999->19996 20001 6ca7d1c 20000->20001 20002 6ca7aac 20001->20002 20006 6ca5868 Wow64SetThreadContext 20001->20006 20007 6ca5860 Wow64SetThreadContext 20001->20007 20002->19898 20003 6ca81a7 20002->20003 20004 6ca5ae8 ReadProcessMemory 20002->20004 20005 6ca5af0 ReadProcessMemory 20002->20005 20004->20002 20005->20002 20006->20002 20007->20002 20009 6ca7816 20008->20009 20014 6ca5c88 CreateProcessA 20009->20014 20015 6ca5c7c CreateProcessA 20009->20015 20010 6ca795f 20011 6ca799c 20010->20011 20012 6ca59f8 WriteProcessMemory 20010->20012 20013 6ca5a00 WriteProcessMemory 20010->20013 20011->19898 20012->20010 20013->20010 20014->20010 20015->20010 20017 6ca57f8 ResumeThread 20016->20017 20019 6ca5829 20017->20019 20019->19928 20021 6ca57f8 ResumeThread 20020->20021 20023 6ca5829 20021->20023 20023->19928 20025 6ca5a48 WriteProcessMemory 20024->20025 20027 6ca5a9f 20025->20027 20027->19938 20029 6ca5a48 WriteProcessMemory 20028->20029 20031 6ca5a9f 20029->20031 20031->19938 20033 6ca58ad Wow64SetThreadContext 20032->20033 20035 6ca58f5 20033->20035 20035->19943 20037 6ca58ad Wow64SetThreadContext 20036->20037 20039 6ca58f5 20037->20039 20039->19943 20041 6ca5d11 20040->20041 20041->20041 20042 6ca5e76 CreateProcessA 20041->20042 20043 6ca5ed3 20042->20043 20045 6ca5d11 20044->20045 20045->20045 20046 6ca5e76 CreateProcessA 20045->20046 20047 6ca5ed3 20046->20047 20049 6ca8555 20048->20049 20058 6ca5938 20049->20058 20062 6ca5940 20049->20062 20050 6ca8574 20050->19965 20054 6ca8540 20053->20054 20056 6ca5938 VirtualAllocEx 20054->20056 20057 6ca5940 VirtualAllocEx 20054->20057 20055 6ca8574 20055->19965 20056->20055 20057->20055 20059 6ca5980 VirtualAllocEx 20058->20059 20061 6ca59bd 20059->20061 20061->20050 20063 6ca5980 VirtualAllocEx 20062->20063 20065 6ca59bd 20063->20065 20065->20050 20067 6ca5b3b ReadProcessMemory 20066->20067 20069 6ca5b7f 20067->20069 20069->19972 20071 6ca5b3b ReadProcessMemory 20070->20071 20073 6ca5b7f 20071->20073 20073->19972 19824 23cac50 19825 23cac5f 19824->19825 19828 23cad38 19824->19828 19833 23cad48 19824->19833 19829 23cad7c 19828->19829 19830 23cad59 19828->19830 19829->19825 19830->19829 19831 23caf80 GetModuleHandleW 19830->19831 19832 23cafad 19831->19832 19832->19825 19834 23cad7c 19833->19834 19835 23cad59 19833->19835 19834->19825 19835->19834 19836 23caf80 GetModuleHandleW 19835->19836 19837 23cafad 19836->19837 19837->19825 20074 23ccfe0 20075 23cd026 20074->20075 20079 23cd5c8 20075->20079 20082 23cd5b9 20075->20082 20076 23cd113 20080 23cd5f6 20079->20080 20085 23cd21c 20079->20085 20080->20076 20083 23cd21c DuplicateHandle 20082->20083 20084 23cd5f6 20083->20084 20084->20076 20086 23cd630 DuplicateHandle 20085->20086 20087 23cd6c6 20086->20087 20087->20080
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 42a919445bacaef8d8b320427f36b27905d8d7ce44c35856da16acc1426f40c3
                                                                                    • Instruction ID: ff91cbcfa64325f7cd522d4923179e73601f4f4a4b71853bf1a8bf81cbf66a0e
                                                                                    • Opcode Fuzzy Hash: 42a919445bacaef8d8b320427f36b27905d8d7ce44c35856da16acc1426f40c3
                                                                                    • Instruction Fuzzy Hash: 5BC1A870B017068FDBA9DB76C864BAAB7FBAF89704F24446DD1469B390CB34E901CB51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 6ca5c7c-6ca5d1d 2 6ca5d1f-6ca5d29 0->2 3 6ca5d56-6ca5d76 0->3 2->3 4 6ca5d2b-6ca5d2d 2->4 8 6ca5d78-6ca5d82 3->8 9 6ca5daf-6ca5dde 3->9 6 6ca5d2f-6ca5d39 4->6 7 6ca5d50-6ca5d53 4->7 10 6ca5d3b 6->10 11 6ca5d3d-6ca5d4c 6->11 7->3 8->9 12 6ca5d84-6ca5d86 8->12 19 6ca5de0-6ca5dea 9->19 20 6ca5e17-6ca5ed1 CreateProcessA 9->20 10->11 11->11 13 6ca5d4e 11->13 14 6ca5d88-6ca5d92 12->14 15 6ca5da9-6ca5dac 12->15 13->7 17 6ca5d96-6ca5da5 14->17 18 6ca5d94 14->18 15->9 17->17 21 6ca5da7 17->21 18->17 19->20 22 6ca5dec-6ca5dee 19->22 31 6ca5eda-6ca5f60 20->31 32 6ca5ed3-6ca5ed9 20->32 21->15 24 6ca5df0-6ca5dfa 22->24 25 6ca5e11-6ca5e14 22->25 26 6ca5dfe-6ca5e0d 24->26 27 6ca5dfc 24->27 25->20 26->26 28 6ca5e0f 26->28 27->26 28->25 42 6ca5f62-6ca5f66 31->42 43 6ca5f70-6ca5f74 31->43 32->31 42->43 44 6ca5f68 42->44 45 6ca5f76-6ca5f7a 43->45 46 6ca5f84-6ca5f88 43->46 44->43 45->46 49 6ca5f7c 45->49 47 6ca5f8a-6ca5f8e 46->47 48 6ca5f98-6ca5f9c 46->48 47->48 50 6ca5f90 47->50 51 6ca5fae-6ca5fb5 48->51 52 6ca5f9e-6ca5fa4 48->52 49->46 50->48 53 6ca5fcc 51->53 54 6ca5fb7-6ca5fc6 51->54 52->51 56 6ca5fcd 53->56 54->53 56->56
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06CA5EBE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: 758ff81b8aef29161c72c0dfce32a089a0792d4b8335c9c822f02dc7ef599687
                                                                                    • Instruction ID: 5d88c521969d59fc6dcdc4091be53f9107ac8becbac31bbbe9bd0a5f58965a5c
                                                                                    • Opcode Fuzzy Hash: 758ff81b8aef29161c72c0dfce32a089a0792d4b8335c9c822f02dc7ef599687
                                                                                    • Instruction Fuzzy Hash: 8EA16A71D0031ACFEB60CFA8C9457DDBBB2BF48314F5485A9E848A7280DB759A85CF91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 57 6ca5c88-6ca5d1d 59 6ca5d1f-6ca5d29 57->59 60 6ca5d56-6ca5d76 57->60 59->60 61 6ca5d2b-6ca5d2d 59->61 65 6ca5d78-6ca5d82 60->65 66 6ca5daf-6ca5dde 60->66 63 6ca5d2f-6ca5d39 61->63 64 6ca5d50-6ca5d53 61->64 67 6ca5d3b 63->67 68 6ca5d3d-6ca5d4c 63->68 64->60 65->66 69 6ca5d84-6ca5d86 65->69 76 6ca5de0-6ca5dea 66->76 77 6ca5e17-6ca5ed1 CreateProcessA 66->77 67->68 68->68 70 6ca5d4e 68->70 71 6ca5d88-6ca5d92 69->71 72 6ca5da9-6ca5dac 69->72 70->64 74 6ca5d96-6ca5da5 71->74 75 6ca5d94 71->75 72->66 74->74 78 6ca5da7 74->78 75->74 76->77 79 6ca5dec-6ca5dee 76->79 88 6ca5eda-6ca5f60 77->88 89 6ca5ed3-6ca5ed9 77->89 78->72 81 6ca5df0-6ca5dfa 79->81 82 6ca5e11-6ca5e14 79->82 83 6ca5dfe-6ca5e0d 81->83 84 6ca5dfc 81->84 82->77 83->83 85 6ca5e0f 83->85 84->83 85->82 99 6ca5f62-6ca5f66 88->99 100 6ca5f70-6ca5f74 88->100 89->88 99->100 101 6ca5f68 99->101 102 6ca5f76-6ca5f7a 100->102 103 6ca5f84-6ca5f88 100->103 101->100 102->103 106 6ca5f7c 102->106 104 6ca5f8a-6ca5f8e 103->104 105 6ca5f98-6ca5f9c 103->105 104->105 107 6ca5f90 104->107 108 6ca5fae-6ca5fb5 105->108 109 6ca5f9e-6ca5fa4 105->109 106->103 107->105 110 6ca5fcc 108->110 111 6ca5fb7-6ca5fc6 108->111 109->108 113 6ca5fcd 110->113 111->110 113->113
                                                                                    APIs
                                                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06CA5EBE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: CreateProcess
                                                                                    • String ID:
                                                                                    • API String ID: 963392458-0
                                                                                    • Opcode ID: a5435a96fa8477f00555945c8ca709d2fe28e9f0b6aeb7221e35c629c28998ea
                                                                                    • Instruction ID: ffa23f3a382f2c14d58b0144fa828d7ade2ecebc8e0b41b54c837f66aa4bb9c2
                                                                                    • Opcode Fuzzy Hash: a5435a96fa8477f00555945c8ca709d2fe28e9f0b6aeb7221e35c629c28998ea
                                                                                    • Instruction Fuzzy Hash: 74914971D0031ADFEB60CFA8C9457DEBBB2BF48314F548569E808A7240DB759A85CF91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 114 23cad48-23cad57 115 23cad59-23cad66 call 23ca06c 114->115 116 23cad83-23cad87 114->116 122 23cad7c 115->122 123 23cad68 115->123 118 23cad89-23cad93 116->118 119 23cad9b-23caddc 116->119 118->119 125 23cadde-23cade6 119->125 126 23cade9-23cadf7 119->126 122->116 170 23cad6e call 23cafe0 123->170 171 23cad6e call 23cafd1 123->171 125->126 127 23cadf9-23cadfe 126->127 128 23cae1b-23cae1d 126->128 130 23cae09 127->130 131 23cae00-23cae07 call 23ca078 127->131 132 23cae20-23cae27 128->132 129 23cad74-23cad76 129->122 133 23caeb8-23caf78 129->133 134 23cae0b-23cae19 130->134 131->134 136 23cae29-23cae31 132->136 137 23cae34-23cae3b 132->137 165 23caf7a-23caf7d 133->165 166 23caf80-23cafab GetModuleHandleW 133->166 134->132 136->137 139 23cae3d-23cae45 137->139 140 23cae48-23cae51 call 23ca088 137->140 139->140 145 23cae5e-23cae63 140->145 146 23cae53-23cae5b 140->146 148 23cae65-23cae6c 145->148 149 23cae81-23cae85 145->149 146->145 148->149 150 23cae6e-23cae7e call 23ca098 call 23ca0a8 148->150 153 23cae8b-23cae8e 149->153 150->149 155 23cae90-23caeae 153->155 156 23caeb1-23caeb7 153->156 155->156 165->166 167 23cafad-23cafb3 166->167 168 23cafb4-23cafc8 166->168 167->168 170->129 171->129
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 023CAF9E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143474048.00000000023C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_23c0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 4139908857-0
                                                                                    • Opcode ID: 05af8c5a7943bfbbbb608c9284ce2cd304d64e94eccc0b6fb5c30b172edb2ab8
                                                                                    • Instruction ID: 3075a5af8104a37aef75bfe61053f2c3e420e2d277efc5f20ee213f9726f3852
                                                                                    • Opcode Fuzzy Hash: 05af8c5a7943bfbbbb608c9284ce2cd304d64e94eccc0b6fb5c30b172edb2ab8
                                                                                    • Instruction Fuzzy Hash: C27155B0A00B098FD724DF2AD44475ABBF1FF88714F208A2DD48AD7A40DB75E849CB91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 172 23c590c-23c5913 173 23c591c-23c59d9 CreateActCtxA 172->173 175 23c59db-23c59e1 173->175 176 23c59e2-23c5a3c 173->176 175->176 183 23c5a3e-23c5a41 176->183 184 23c5a4b-23c5a4f 176->184 183->184 185 23c5a60 184->185 186 23c5a51-23c5a5d 184->186 188 23c5a61 185->188 186->185 188->188
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 023C59C9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143474048.00000000023C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_23c0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: fa004633eeeea11c33e0f67fb27e5a33434bae594ac8b8b6fb6f9b1367fd40b7
                                                                                    • Instruction ID: 3413404d23c0c262734decbfe07537e7436d68e32b452c6712deab026f0f2987
                                                                                    • Opcode Fuzzy Hash: fa004633eeeea11c33e0f67fb27e5a33434bae594ac8b8b6fb6f9b1367fd40b7
                                                                                    • Instruction Fuzzy Hash: F841D1B0C00719CBEB24CFAAC9847CEBBB5BF48314F60805AD449BB251DB75694ACF51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 189 23c44b0-23c59d9 CreateActCtxA 192 23c59db-23c59e1 189->192 193 23c59e2-23c5a3c 189->193 192->193 200 23c5a3e-23c5a41 193->200 201 23c5a4b-23c5a4f 193->201 200->201 202 23c5a60 201->202 203 23c5a51-23c5a5d 201->203 205 23c5a61 202->205 203->202 205->205
                                                                                    APIs
                                                                                    • CreateActCtxA.KERNEL32(?), ref: 023C59C9
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143474048.00000000023C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_23c0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: Create
                                                                                    • String ID:
                                                                                    • API String ID: 2289755597-0
                                                                                    • Opcode ID: 336f99a10bcd619ddab09a427805326fd07b697f2ae36640c85871897cd56ff8
                                                                                    • Instruction ID: 3a4db47523dad5a001b70f1a665954896bee934e9ce376bada9786f88016dad9
                                                                                    • Opcode Fuzzy Hash: 336f99a10bcd619ddab09a427805326fd07b697f2ae36640c85871897cd56ff8
                                                                                    • Instruction Fuzzy Hash: D241F270C0071DCBEB24CFAAC944B8EBBB5BF48304F60805AD409BB251DB716949CF91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 206 6ca59f8-6ca5a4e 208 6ca5a5e-6ca5a9d WriteProcessMemory 206->208 209 6ca5a50-6ca5a5c 206->209 211 6ca5a9f-6ca5aa5 208->211 212 6ca5aa6-6ca5ad6 208->212 209->208 211->212
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06CA5A90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: e8d7a0687bc2a3707c1effd44137cd2f2d771c74a6dc349fafb621f2006583ec
                                                                                    • Instruction ID: c1eb4e548d74b7825cb2c038ec752486ce7b92cec0a291020a1fedf30f3aec2c
                                                                                    • Opcode Fuzzy Hash: e8d7a0687bc2a3707c1effd44137cd2f2d771c74a6dc349fafb621f2006583ec
                                                                                    • Instruction Fuzzy Hash: 5C2168B5D0034ADFDB10CFA9C880BEEBBF1BF48310F10892AE558A7240D7789940CBA4

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 216 6ca5a00-6ca5a4e 218 6ca5a5e-6ca5a9d WriteProcessMemory 216->218 219 6ca5a50-6ca5a5c 216->219 221 6ca5a9f-6ca5aa5 218->221 222 6ca5aa6-6ca5ad6 218->222 219->218 221->222
                                                                                    APIs
                                                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06CA5A90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessWrite
                                                                                    • String ID:
                                                                                    • API String ID: 3559483778-0
                                                                                    • Opcode ID: eeffa0eebc03893573c42121bfbe700b269704c1c329d9f0b951721f6b027e28
                                                                                    • Instruction ID: bf348ffd6c9f0db4103f2dbe13b718b034234de255adb9e7ccd44bfe3c2057b5
                                                                                    • Opcode Fuzzy Hash: eeffa0eebc03893573c42121bfbe700b269704c1c329d9f0b951721f6b027e28
                                                                                    • Instruction Fuzzy Hash: 9121377190030ADFDB10CFA9C881BEEBBF5BF48314F108429E918A7240D7789950CBA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 226 23cd21c-23cd6c4 DuplicateHandle 228 23cd6cd-23cd6ea 226->228 229 23cd6c6-23cd6cc 226->229 229->228
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,023CD5F6,?,?,?,?,?), ref: 023CD6B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143474048.00000000023C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_23c0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 7a24fb63254c475b89f458d222d8fac1630f61e68600a457c04fa7f6f7456c02
                                                                                    • Instruction ID: 23164c66e7ee3b74cb5d5a987e12c826e81973da0288c60ccc85e780d60230a5
                                                                                    • Opcode Fuzzy Hash: 7a24fb63254c475b89f458d222d8fac1630f61e68600a457c04fa7f6f7456c02
                                                                                    • Instruction Fuzzy Hash: F521E5B5900209DFDB10DF9AD584ADEFBF4FB48314F14801AE958A3310D374A954CFA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 248 6ca5ae8-6ca5b7d ReadProcessMemory 251 6ca5b7f-6ca5b85 248->251 252 6ca5b86-6ca5bb6 248->252 251->252
                                                                                    APIs
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06CA5B70
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessRead
                                                                                    • String ID:
                                                                                    • API String ID: 1726664587-0
                                                                                    • Opcode ID: 29af4f0c36f955e2978c87ee03a6f31e8b2489cc1114b61afdcbc24aa8758821
                                                                                    • Instruction ID: 5ac1f78651f34a11aebd16fd7b0adb47b608073544c130ccb0f07e3a18320804
                                                                                    • Opcode Fuzzy Hash: 29af4f0c36f955e2978c87ee03a6f31e8b2489cc1114b61afdcbc24aa8758821
                                                                                    • Instruction Fuzzy Hash: 282105B1C0034A9FDB10CFA9C981BAEFBF5BF48314F10882EE559A7250D7789550CB65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 238 6ca5860-6ca58b3 240 6ca58c3-6ca58f3 Wow64SetThreadContext 238->240 241 6ca58b5-6ca58c1 238->241 243 6ca58fc-6ca592c 240->243 244 6ca58f5-6ca58fb 240->244 241->240 244->243
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06CA58E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: 6b1e21beb639eb8a80740702c97ee11c3377649fd2063c4cc350d60315c5a3a7
                                                                                    • Instruction ID: 87691e9d43ff6a1e4122fb60214c3cbd9996d9ae724c2760b12c237046a40011
                                                                                    • Opcode Fuzzy Hash: 6b1e21beb639eb8a80740702c97ee11c3377649fd2063c4cc350d60315c5a3a7
                                                                                    • Instruction Fuzzy Hash: 0D2157B1D0030A8FDB10CFAAC5857AEBBF4AF88314F14842ED559A7240DB789544CFA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 232 23cd629-23cd62e 233 23cd630-23cd6c4 DuplicateHandle 232->233 234 23cd6cd-23cd6ea 233->234 235 23cd6c6-23cd6cc 233->235 235->234
                                                                                    APIs
                                                                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,023CD5F6,?,?,?,?,?), ref: 023CD6B7
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143474048.00000000023C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_23c0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: DuplicateHandle
                                                                                    • String ID:
                                                                                    • API String ID: 3793708945-0
                                                                                    • Opcode ID: 4acf1d67f4701262f5aa3fa3e34f1c502ea2535e28e8209f32d4ebdd4e679eb1
                                                                                    • Instruction ID: 8048891c61a6feac14be29efc1832fc8430aefdaf14e4a1e5b6591e41f653aca
                                                                                    • Opcode Fuzzy Hash: 4acf1d67f4701262f5aa3fa3e34f1c502ea2535e28e8209f32d4ebdd4e679eb1
                                                                                    • Instruction Fuzzy Hash: 6F21E5B5900209DFDB10CF9AD584ADEBBF5FB48324F14801AE958A3310D374A954CF65

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 266 6ca5af0-6ca5b7d ReadProcessMemory 269 6ca5b7f-6ca5b85 266->269 270 6ca5b86-6ca5bb6 266->270 269->270
                                                                                    APIs
                                                                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06CA5B70
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: MemoryProcessRead
                                                                                    • String ID:
                                                                                    • API String ID: 1726664587-0
                                                                                    • Opcode ID: 92bdd09b5bb3465d3142da2b9d293ab1ce849495e6546996bfe1bbb93e07501d
                                                                                    • Instruction ID: 7f9802fa92e06e999906cf60fd13672975411f933060f5c2d855b08823f1e921
                                                                                    • Opcode Fuzzy Hash: 92bdd09b5bb3465d3142da2b9d293ab1ce849495e6546996bfe1bbb93e07501d
                                                                                    • Instruction Fuzzy Hash: 2D2105B18003499FDB10CFAAC885ADEBBF5FF88320F508429E558A7240C7789550CBA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 256 6ca5868-6ca58b3 258 6ca58c3-6ca58f3 Wow64SetThreadContext 256->258 259 6ca58b5-6ca58c1 256->259 261 6ca58fc-6ca592c 258->261 262 6ca58f5-6ca58fb 258->262 259->258 262->261
                                                                                    APIs
                                                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06CA58E6
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: ContextThreadWow64
                                                                                    • String ID:
                                                                                    • API String ID: 983334009-0
                                                                                    • Opcode ID: 55c5060e8bc891c643820db1cf2133abf69d41c0d917275795dbde4f71b0db1d
                                                                                    • Instruction ID: 82f7aca222f299b09dd9eafc03a26a859ef25cfc6c4b628216d53eeee158fbbc
                                                                                    • Opcode Fuzzy Hash: 55c5060e8bc891c643820db1cf2133abf69d41c0d917275795dbde4f71b0db1d
                                                                                    • Instruction Fuzzy Hash: 12213871D0030A8FDB10DFAAC4857AEBBF4EF88324F54842AD559A7240CB789944CFA5

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 282 6ca5940-6ca59bb VirtualAllocEx 285 6ca59bd-6ca59c3 282->285 286 6ca59c4-6ca59e9 282->286 285->286
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06CA59AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 17910eec429945861ee360a74e955dc3e92870c997684720041e8af911e93384
                                                                                    • Instruction ID: 2331e281762301cc64385f6b39ec3a4aacae680fca895c7e45ea0112f8d7faa5
                                                                                    • Opcode Fuzzy Hash: 17910eec429945861ee360a74e955dc3e92870c997684720041e8af911e93384
                                                                                    • Instruction Fuzzy Hash: D61156729003499FDB10CFAAC844BDEBBF5AF88324F108419E519A7250CB75A550CBA1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 274 6ca5938-6ca59bb VirtualAllocEx 277 6ca59bd-6ca59c3 274->277 278 6ca59c4-6ca59e9 274->278 277->278
                                                                                    APIs
                                                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06CA59AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: AllocVirtual
                                                                                    • String ID:
                                                                                    • API String ID: 4275171209-0
                                                                                    • Opcode ID: 0bf5ce2491f8904fe54eaf5866c477d9a76277d0dbf1e8eea108696de9a615d8
                                                                                    • Instruction ID: 46e90c15ad6f7792aaced56926fd52a2ab6594103bb5ecb99ff22d11785b8669
                                                                                    • Opcode Fuzzy Hash: 0bf5ce2491f8904fe54eaf5866c477d9a76277d0dbf1e8eea108696de9a615d8
                                                                                    • Instruction Fuzzy Hash: 6B1189B180034ACFDB10CFA9C9447DEFBF5AF88324F208819D555A7250C775A540CFA1
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 4d4288b5a194838a58d43745cc0ec27cbecb47cc75773b3770c69d339c7b0fda
                                                                                    • Instruction ID: d9185f0f7eddb51c1c0545d8f906dad811f312c8cea26f784871ba9f513a90bb
                                                                                    • Opcode Fuzzy Hash: 4d4288b5a194838a58d43745cc0ec27cbecb47cc75773b3770c69d339c7b0fda
                                                                                    • Instruction Fuzzy Hash: FA1146B5D0034ACFDB20CFAAC94579EFBF4AF88224F24881AD559A7240C774A540CBA5
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: ResumeThread
                                                                                    • String ID:
                                                                                    • API String ID: 947044025-0
                                                                                    • Opcode ID: 50ad3bd806ef0c3e92d37845274881631114ff00111cbf7c4b8576158b5cd72b
                                                                                    • Instruction ID: dfbb350371dad344695a5bab386c0680ba7632feb1e24d05828da5d55a4dc8b5
                                                                                    • Opcode Fuzzy Hash: 50ad3bd806ef0c3e92d37845274881631114ff00111cbf7c4b8576158b5cd72b
                                                                                    • Instruction Fuzzy Hash: 701136B1D00349CFDB20DFAAC84579EFBF4AF88724F24841AD519A7240CB79A944CBA5
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 06CA8A35
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: e266104cc423c8f51db27443d1930ecffee4b0f733baf9fff42b8d81d0523756
                                                                                    • Instruction ID: ce4b4cc425686550bd76fc0bef9c5f849d1c6677b4688ad5be5d43f7cc89aa58
                                                                                    • Opcode Fuzzy Hash: e266104cc423c8f51db27443d1930ecffee4b0f733baf9fff42b8d81d0523756
                                                                                    • Instruction Fuzzy Hash: 4311F2B5800349DFDB50CF9AC948BDEBBF8EB48324F10841AE958A7640C3B5A954CFA5
                                                                                    APIs
                                                                                    • GetModuleHandleW.KERNELBASE(00000000), ref: 023CAF9E
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143474048.00000000023C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_23c0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: HandleModule
                                                                                    • String ID:
                                                                                    • API String ID: 4139908857-0
                                                                                    • Opcode ID: 941cf5e307eb9d1882247912146f95f43bafed1f72a799d01598828f9315e1f3
                                                                                    • Instruction ID: 4ce23df8216481c15859fad35fc1487d07c70db9b0e9b4ec8629c910d5575a58
                                                                                    • Opcode Fuzzy Hash: 941cf5e307eb9d1882247912146f95f43bafed1f72a799d01598828f9315e1f3
                                                                                    • Instruction Fuzzy Hash: 541113B6C003498FCB10CF9AD944BDEFBF4AF88224F20841AD858A7200C379A545CFA1
                                                                                    APIs
                                                                                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 06CA8A35
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: MessagePost
                                                                                    • String ID:
                                                                                    • API String ID: 410705778-0
                                                                                    • Opcode ID: b7551507edd93e1113fb7885d4ad0fd76d55dd6fd59d47a81ac8fa227e857dee
                                                                                    • Instruction ID: 5c9bf747bb971ac6b7d6cb447794ca5a4745a81807b00719f6acf3f92339aa8b
                                                                                    • Opcode Fuzzy Hash: b7551507edd93e1113fb7885d4ad0fd76d55dd6fd59d47a81ac8fa227e857dee
                                                                                    • Instruction Fuzzy Hash: 3511F2B9800349CFDB10CF99D544BDEBBF4FB48314F20881AD558A7240C378A945CFA1
                                                                                    APIs
                                                                                    • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,06CA9BC9,?,?), ref: 06CA9D70
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: fa25ddd12997a95c724ac051e944db02faa5d4ab08429fcc28f96c7b9a902e5a
                                                                                    • Instruction ID: ebf55ecaa49603d07e7f7276c58ba747fc9f20576f4686534cf157de8b312d36
                                                                                    • Opcode Fuzzy Hash: fa25ddd12997a95c724ac051e944db02faa5d4ab08429fcc28f96c7b9a902e5a
                                                                                    • Instruction Fuzzy Hash: 531132B280034A8FDB10CF9AC445B9EBBF4EB88224F208419D958A7240D378A984CBA5
                                                                                    APIs
                                                                                    • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,06CA9BC9,?,?), ref: 06CA9D70
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: CloseHandle
                                                                                    • String ID:
                                                                                    • API String ID: 2962429428-0
                                                                                    • Opcode ID: 61b990cf990bf1b3491a77157f9dbf4d5f72783012f3fba88472d321bcec88c7
                                                                                    • Instruction ID: dbf6b261d63c5f51787a1d2b62da21032d350975086c571786a2ec18b76c2f4c
                                                                                    • Opcode Fuzzy Hash: 61b990cf990bf1b3491a77157f9dbf4d5f72783012f3fba88472d321bcec88c7
                                                                                    • Instruction Fuzzy Hash: 6A1122B6C0034ACFDB10CF99C5457AEBBF0AB48324F20841AD998A7740D778A684CFA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143107293.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b3d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 14668d6459217f7510df31c5622b6ab226417c5f84def4aba73cd8f0fafccdc8
                                                                                    • Instruction ID: 83808486150e53281aec8d2a9cd60e80b78d62541c5cdb8b54a669a165b92c67
                                                                                    • Opcode Fuzzy Hash: 14668d6459217f7510df31c5622b6ab226417c5f84def4aba73cd8f0fafccdc8
                                                                                    • Instruction Fuzzy Hash: D6210676504204EFDB05DF14E9C0B26BFA5FB94324F30C5A9D9090B356C336E856CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143107293.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b3d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d35ced08e02c9d56563907af0dcaddb1d49eecb667a8e9e99d50e0d328f28c70
                                                                                    • Instruction ID: 91137f25e4d0acd786161046d9b137bdd2a4d9b647d4412fec79d24e9c4346ad
                                                                                    • Opcode Fuzzy Hash: d35ced08e02c9d56563907af0dcaddb1d49eecb667a8e9e99d50e0d328f28c70
                                                                                    • Instruction Fuzzy Hash: 0B212572604240EFDB05DF14E9C0B2ABFA5FB98318F30C5A9E9090B256C336D856CAA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143162532.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b4d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f36dd097dc8556f62af8dd625f4727332f7fbf8d6340cf00f769c2a47b0760d2
                                                                                    • Instruction ID: 3dbb0500af7c71671df8f985f6fea8f3b05a347d40a944a10165042349d26bfe
                                                                                    • Opcode Fuzzy Hash: f36dd097dc8556f62af8dd625f4727332f7fbf8d6340cf00f769c2a47b0760d2
                                                                                    • Instruction Fuzzy Hash: 36212675604304EFDB05DF14D9C0B26BBE5FB84314F20C6ADE9094B392C7B6D946DA61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143162532.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b4d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 810d6376ed37728839454622fdd178f94e4a158bd428ab1505d8296d36123cba
                                                                                    • Instruction ID: 2484b151d8c9fea01349deaf94ea43ce9f232346cad44816df03bdb8b7b93d21
                                                                                    • Opcode Fuzzy Hash: 810d6376ed37728839454622fdd178f94e4a158bd428ab1505d8296d36123cba
                                                                                    • Instruction Fuzzy Hash: 79213175604300EFCB14DF24D9D0B26BBA1FB88314F20C5ADE90A4B392C37AD907DA61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143162532.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b4d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c9d9616498f36ba39eb0450921001d9adc37d3d6ce19a2a124e5ae466200c656
                                                                                    • Instruction ID: d2e4724d389998b4dbaa34733fc257156bdb60020c65aa7969cef6977f61e26d
                                                                                    • Opcode Fuzzy Hash: c9d9616498f36ba39eb0450921001d9adc37d3d6ce19a2a124e5ae466200c656
                                                                                    • Instruction Fuzzy Hash: 492192755083809FCB02CF14D994B11BFB1EB46314F28C5DAD8498F2A7C33AD906CB62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143107293.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b3d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                                    • Instruction ID: 23a6f07831c7d9aef017edd71bc9c9420101f24ca2f0d2cf6a93d7842e3ce566
                                                                                    • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                                    • Instruction Fuzzy Hash: 4011D376504280DFCB16CF10D5C4B16BFB1FB94318F34C6A9D8490B656C33AD856CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143107293.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b3d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                                    • Instruction ID: deeb829f48d1ac53d847651db1ceb6fc51d26b494312a2ef3455906a2144e3a8
                                                                                    • Opcode Fuzzy Hash: fed46cca7f742b7caa711e8ed735342f41d2c2d3303e466d284e334843d61363
                                                                                    • Instruction Fuzzy Hash: CF11B1B6504280DFCB16CF10E5C4B16BFB1FB94324F24C6A9D8490B756C33AE856CBA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143162532.0000000000B4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B4D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b4d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                                                    • Instruction ID: 35d468255cf25249038d6d84bc2ba755dc11add48e2f0bf02d7592ddb4ece5f2
                                                                                    • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                                                                                    • Instruction Fuzzy Hash: E911BB75504280DFCB01CF10C5C4B15BBA1FB84314F24C6A9D8494B2A6C37AD80ACB61
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143107293.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b3d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6ad09954d0182b4f137d877b845f942c1608a0b16d99e5cce0720334ed96dd01
                                                                                    • Instruction ID: f4734500dc39c0aca93e76e8a6305078dab83a39d36be0b9c65aef8db41e66e2
                                                                                    • Opcode Fuzzy Hash: 6ad09954d0182b4f137d877b845f942c1608a0b16d99e5cce0720334ed96dd01
                                                                                    • Instruction Fuzzy Hash: B0012671504340DAE7104B26EDC4B66FFD8EF41720F38C59AED090A286CBB8DC40C6B1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143107293.0000000000B3D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00B3D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_b3d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ea64801b6f54559ebcf9590c01ca0ef954776dbddba4e9ca30984ac0f95aa100
                                                                                    • Instruction ID: 4d525adb2bc4bce9ef76b7f12348d3740f2539c3dd2c220143747d8bbcaab7c3
                                                                                    • Opcode Fuzzy Hash: ea64801b6f54559ebcf9590c01ca0ef954776dbddba4e9ca30984ac0f95aa100
                                                                                    • Instruction Fuzzy Hash: 4EF06271405344EEE7108A16DD84B62FFE8EF51724F28C55AED084B286C779AC44CAB1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e996eaafa93dc5a1b7dbce8bca6bd41b55c68d1b2e181a5f7479a90f2100275a
                                                                                    • Instruction ID: a4d8f917085ba2a009c20854fe673bcc999e198a1b33686fab4d41b9a911f310
                                                                                    • Opcode Fuzzy Hash: e996eaafa93dc5a1b7dbce8bca6bd41b55c68d1b2e181a5f7479a90f2100275a
                                                                                    • Instruction Fuzzy Hash: 32E1F874E002598FDB14DFA9C580AAEFBB2FF89304F64C269D514AB355D770A942CFA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a0a4d0c8fd97bb62df56752302d671be6fbd3b7a76950e7575ee56c04e6da5dc
                                                                                    • Instruction ID: 0b0f541fd99fbbe6d18d61d340fccd978499a68d42f3a162516513ebc7fb4e04
                                                                                    • Opcode Fuzzy Hash: a0a4d0c8fd97bb62df56752302d671be6fbd3b7a76950e7575ee56c04e6da5dc
                                                                                    • Instruction Fuzzy Hash: 48E1F774E002598FDB54DFA9C580AAEFBF2BF89304F248269D414AB355D771A942CFA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c6da65de373382a8ac41432c31186aa88eee4109e4e1b50b75a08b6dcc139772
                                                                                    • Instruction ID: 6258be9a031bbd0682bdbcdae70e9413c9d46eddba46329ed3631f87bcd158e0
                                                                                    • Opcode Fuzzy Hash: c6da65de373382a8ac41432c31186aa88eee4109e4e1b50b75a08b6dcc139772
                                                                                    • Instruction Fuzzy Hash: F7E1F674E002598FDB14DFA9D580AAEFBF2BF89304F24C269D415AB355D770A942CFA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cc593bf466378f742c74d86304bcf35e24b3f346beb4adbea3cc58b99d8956d2
                                                                                    • Instruction ID: 5acd3bb5163868a104367acf8e44d4a13c1facbcbfc638f48f1eb773bac53e4f
                                                                                    • Opcode Fuzzy Hash: cc593bf466378f742c74d86304bcf35e24b3f346beb4adbea3cc58b99d8956d2
                                                                                    • Instruction Fuzzy Hash: 7EE1FB74E002698FDB54DFA9C590AAEFBB2FF49304F248169D414AB355D734AE42CFA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9a776f9515354e3d151611759d4bc6ff11ae80c2b94608ad36f63a961e207e37
                                                                                    • Instruction ID: f3be2e8be2bad56a0976a956b82557bd7f12fbb32d6f5b4d27aed15a336aaf2c
                                                                                    • Opcode Fuzzy Hash: 9a776f9515354e3d151611759d4bc6ff11ae80c2b94608ad36f63a961e207e37
                                                                                    • Instruction Fuzzy Hash: 4AE1FC74E002598FDB14DFA9C594AAEFBF2FF89304F248269D418A7355D731A942CFA0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2143474048.00000000023C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 023C0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_23c0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2e7e0be6f32a71788bd386727996ed137a1c78f59f11c9c5867c184537fa9a1b
                                                                                    • Instruction ID: ea62d8cd22e0e47948c657bbfdc5b4f78f6c697a4b737a4a537aeefbb8f733eb
                                                                                    • Opcode Fuzzy Hash: 2e7e0be6f32a71788bd386727996ed137a1c78f59f11c9c5867c184537fa9a1b
                                                                                    • Instruction Fuzzy Hash: E4A13832A002098FCF15DFA5C84059EBBB3FF85304B25856EE906AB265DB71ED16CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2146931174.0000000006CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06CA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_6ca0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bda75bba144e63b0f102f0351ba93d4d619a7d89f5e78d29a71d538ebe31f86d
                                                                                    • Instruction ID: 548f3f9a777914bf97047b44dded684207035fbd7f7028cd8b55aded8271d8d1
                                                                                    • Opcode Fuzzy Hash: bda75bba144e63b0f102f0351ba93d4d619a7d89f5e78d29a71d538ebe31f86d
                                                                                    • Instruction Fuzzy Hash: C9511B74E0025A8FDB14DFA9C5809AEFBF2BF89304F24C269C458A7355D7309A42CFA1

                                                                                    Execution Graph

                                                                                    Execution Coverage:14.4%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:39%
                                                                                    Total number of Nodes:41
                                                                                    Total number of Limit Nodes:3
                                                                                    execution_graph 17544 da46d8 17545 da46e4 17544->17545 17548 da48c9 17545->17548 17546 da4713 17549 da48f7 17548->17549 17553 4f415ea 17549->17553 17559 4f415f8 17549->17559 17550 da491a 17550->17546 17554 4f4161a 17553->17554 17555 4f4172c 17554->17555 17565 dac158 17554->17565 17571 dac76c 17554->17571 17577 dac168 17554->17577 17555->17550 17560 4f4161a 17559->17560 17561 4f4172c 17560->17561 17562 dac158 2 API calls 17560->17562 17563 dac168 LdrInitializeThunk 17560->17563 17564 dac76c 2 API calls 17560->17564 17561->17550 17562->17561 17563->17561 17564->17561 17566 dac17a 17565->17566 17570 dac17f 17565->17570 17566->17555 17567 dac764 LdrInitializeThunk 17567->17566 17569 dac168 LdrInitializeThunk 17569->17570 17570->17566 17570->17567 17570->17569 17576 dac623 17571->17576 17573 dac8c1 17573->17555 17574 dac764 LdrInitializeThunk 17574->17573 17575 dac168 LdrInitializeThunk 17575->17576 17576->17574 17576->17575 17578 dac17a 17577->17578 17579 dac17f 17577->17579 17578->17555 17579->17578 17580 dac8a9 LdrInitializeThunk 17579->17580 17580->17578 17581 da4f08 17582 da4f2a 17581->17582 17583 da4ff6 17582->17583 17584 dac158 2 API calls 17582->17584 17585 dac168 LdrInitializeThunk 17582->17585 17586 dac76c 2 API calls 17582->17586 17584->17583 17585->17583 17586->17583 17587 dacab0 17588 dacadd 17587->17588 17589 dac168 LdrInitializeThunk 17588->17589 17590 dae9bf 17588->17590 17592 dacde6 17588->17592 17589->17592 17591 dac168 LdrInitializeThunk 17591->17592 17592->17590 17592->17591

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 979 dac168-dac178 980 dac17a 979->980 981 dac17f-dac18b 979->981 982 dac2ab-dac2b5 980->982 984 dac18d 981->984 985 dac192-dac1a7 981->985 984->982 988 dac2bb-dac2fb call da5d08 985->988 989 dac1ad-dac1b8 985->989 1007 dac302-dac378 call da5d08 call da5c00 988->1007 992 dac1be-dac1c5 989->992 993 dac2b6 989->993 995 dac1f2-dac1fd 992->995 996 dac1c7-dac1de 992->996 993->988 1000 dac20a-dac214 995->1000 1001 dac1ff-dac207 995->1001 996->1007 1008 dac1e4-dac1e7 996->1008 1009 dac21a-dac224 1000->1009 1010 dac29e-dac2a3 1000->1010 1001->1000 1039 dac37a-dac3b7 1007->1039 1040 dac3df-dac454 call da5ca8 1007->1040 1008->993 1012 dac1ed-dac1f0 1008->1012 1009->993 1017 dac22a-dac246 1009->1017 1010->982 1012->995 1012->996 1022 dac24a-dac24d 1017->1022 1023 dac248 1017->1023 1025 dac24f-dac252 1022->1025 1026 dac254-dac257 1022->1026 1023->982 1027 dac25a-dac268 1025->1027 1026->1027 1027->993 1032 dac26a-dac271 1027->1032 1032->982 1034 dac273-dac279 1032->1034 1034->993 1035 dac27b-dac280 1034->1035 1035->993 1037 dac282-dac295 1035->1037 1037->993 1045 dac297-dac29a 1037->1045 1042 dac3b9 1039->1042 1043 dac3be-dac3dc 1039->1043 1048 dac4f3-dac4f9 1040->1048 1042->1043 1043->1040 1045->1034 1047 dac29c 1045->1047 1047->982 1049 dac459-dac46c 1048->1049 1050 dac4ff-dac517 1048->1050 1051 dac46e 1049->1051 1052 dac473-dac4c4 1049->1052 1053 dac52b-dac53e 1050->1053 1054 dac519-dac526 1050->1054 1051->1052 1071 dac4c6-dac4d4 1052->1071 1072 dac4d7-dac4e9 1052->1072 1056 dac540 1053->1056 1057 dac545-dac561 1053->1057 1055 dac8c1-dac9bf 1054->1055 1062 dac9c1-dac9c6 call da5ca8 1055->1062 1063 dac9c7-dac9d1 1055->1063 1056->1057 1060 dac568-dac58c 1057->1060 1061 dac563 1057->1061 1068 dac58e 1060->1068 1069 dac593-dac5c5 1060->1069 1061->1060 1062->1063 1068->1069 1077 dac5cc-dac60e 1069->1077 1078 dac5c7 1069->1078 1071->1050 1074 dac4eb 1072->1074 1075 dac4f0 1072->1075 1074->1075 1075->1048 1080 dac610 1077->1080 1081 dac615-dac61e 1077->1081 1078->1077 1080->1081 1082 dac846-dac84c 1081->1082 1083 dac852-dac865 1082->1083 1084 dac623-dac648 1082->1084 1087 dac86c-dac887 1083->1087 1088 dac867 1083->1088 1085 dac64a 1084->1085 1086 dac64f-dac686 1084->1086 1085->1086 1096 dac688 1086->1096 1097 dac68d-dac6bf 1086->1097 1089 dac889 1087->1089 1090 dac88e-dac8a2 1087->1090 1088->1087 1089->1090 1094 dac8a9-dac8bf LdrInitializeThunk 1090->1094 1095 dac8a4 1090->1095 1094->1055 1095->1094 1096->1097 1099 dac723-dac736 1097->1099 1100 dac6c1-dac6e6 1097->1100 1103 dac738 1099->1103 1104 dac73d-dac762 1099->1104 1101 dac6e8 1100->1101 1102 dac6ed-dac71b 1100->1102 1101->1102 1102->1099 1103->1104 1107 dac771-dac7a9 1104->1107 1108 dac764-dac765 1104->1108 1109 dac7ab 1107->1109 1110 dac7b0-dac811 call dac168 1107->1110 1108->1083 1109->1110 1116 dac818-dac83c 1110->1116 1117 dac813 1110->1117 1120 dac83e 1116->1120 1121 dac843 1116->1121 1117->1116 1120->1121 1121->1082
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4551367053.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_da0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8c7c98c747e74e05740f7103e688483a9177656b51f74a81083188db60e19daf
                                                                                    • Instruction ID: 4cdd383cae02cd42da1c7e48a24f8735b97944ec0cca596e6f17f62e796d7171
                                                                                    • Opcode Fuzzy Hash: 8c7c98c747e74e05740f7103e688483a9177656b51f74a81083188db60e19daf
                                                                                    • Instruction Fuzzy Hash: 12223874E102198FDB14DFA8C884B9DBBF2BF89310F1496A9D409AB355DB749D82CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ea5d1775c93767564a978f022e6284450b6624a80a7b567e54fc154201cdf804
                                                                                    • Instruction ID: 30dd85f81ae8944396a892019c48671ccd4584be8caabd26e04ff124200e2a8a
                                                                                    • Opcode Fuzzy Hash: ea5d1775c93767564a978f022e6284450b6624a80a7b567e54fc154201cdf804
                                                                                    • Instruction Fuzzy Hash: 6E822B71A002199FDB14DFA9C884AAEBBF6BFC9300F158569E805DB365DB34ED42CB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7661404b74eaeeb7ab6ce58a68e6e19d4df5150d7b3a912f16167d517a62fd07
                                                                                    • Instruction ID: 4fe3f1adb25909692836adbcbb5cc4a46ac678086ce823efd2de79ac34da9bcb
                                                                                    • Opcode Fuzzy Hash: 7661404b74eaeeb7ab6ce58a68e6e19d4df5150d7b3a912f16167d517a62fd07
                                                                                    • Instruction Fuzzy Hash: 36824B34A00609DFCB14EFA8C984AAEBBF2FF88354F158559E4459B6A5DB30FD42CB50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2476 4f44500-4f44520 2477 4f44527-4f445a0 2476->2477 2478 4f44522 2476->2478 2482 4f445a2-4f445e9 2477->2482 2483 4f445ee-4f44641 2477->2483 2478->2477 2490 4f44689-4f44743 call 4f45858 2482->2490 2483->2490 2491 4f44643-4f44688 2483->2491 2501 4f44749-4f4476f 2490->2501 2491->2490 2503 4f44775-4f44878 2501->2503 2504 4f45330-4f45365 2501->2504 2514 4f45323-4f45329 2503->2514 2515 4f4487d-4f4495b 2514->2515 2516 4f4532f 2514->2516 2524 4f44962-4f449cb 2515->2524 2525 4f4495d 2515->2525 2516->2504 2529 4f449d2-4f449e3 2524->2529 2530 4f449cd 2524->2530 2525->2524 2531 4f44a70-4f44b77 2529->2531 2532 4f449e9-4f449f3 2529->2532 2530->2529 2550 4f44b7e-4f44be7 2531->2550 2551 4f44b79 2531->2551 2533 4f449f5 2532->2533 2534 4f449fa-4f44a6f 2532->2534 2533->2534 2534->2531 2555 4f44bee-4f44bff 2550->2555 2556 4f44be9 2550->2556 2551->2550 2557 4f44c05-4f44c0f 2555->2557 2558 4f44c8c-4f44e40 2555->2558 2556->2555 2559 4f44c16-4f44c8b 2557->2559 2560 4f44c11 2557->2560 2579 4f44e47-4f44ec5 2558->2579 2580 4f44e42 2558->2580 2559->2558 2560->2559 2584 4f44ec7 2579->2584 2585 4f44ecc-4f44edd 2579->2585 2580->2579 2584->2585 2586 4f44ee3-4f44eed 2585->2586 2587 4f44f6a-4f45003 2585->2587 2588 4f44ef4-4f44f69 2586->2588 2589 4f44eef 2586->2589 2597 4f45005 2587->2597 2598 4f4500a-4f45082 2587->2598 2588->2587 2589->2588 2597->2598 2605 4f45084 2598->2605 2606 4f45089-4f4509a 2598->2606 2605->2606 2607 4f450a0-4f45134 2606->2607 2608 4f45188-4f4521c call 4f42a50 * 2 2606->2608 2625 4f45136 2607->2625 2626 4f4513b-4f45187 2607->2626 2619 4f45222-4f4530d 2608->2619 2620 4f4530e-4f45319 2608->2620 2619->2620 2621 4f45320 2620->2621 2622 4f4531b 2620->2622 2621->2514 2622->2621 2625->2626 2626->2608
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 982aef469ffa2a423a42a1685b6bbbd61bc937fb00f6c75a5f68baea1ba833e1
                                                                                    • Instruction ID: f0627d25a9598d9aa30fe28ea23c4adb3fd89ca90910165258179e97115bb16f
                                                                                    • Opcode Fuzzy Hash: 982aef469ffa2a423a42a1685b6bbbd61bc937fb00f6c75a5f68baea1ba833e1
                                                                                    • Instruction Fuzzy Hash: 1E827B74E01228DFDB64DF69D894BEDBBB2BB89300F1081EA950DA7265DB345E81CF50

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2889 4f415f8-4f41618 2890 4f4161f-4f416e1 2889->2890 2891 4f4161a 2889->2891 2896 4f416e7-4f41704 2890->2896 2897 4f41aac-4f41baa 2890->2897 2891->2890 2954 4f41707 call da5358 2896->2954 2955 4f41707 call da56af 2896->2955 2900 4f41bb2-4f41bb8 2897->2900 2901 4f41bac-4f41bb1 2897->2901 2901->2900 2902 4f4170c-4f41725 2948 4f41727 call dac158 2902->2948 2949 4f41727 call dac168 2902->2949 2950 4f41727 call dac76c 2902->2950 2904 4f4172c-4f4174e 2906 4f41755-4f4175e 2904->2906 2907 4f41750 2904->2907 2908 4f41a9f-4f41aa5 2906->2908 2907->2906 2909 4f41763-4f417fb 2908->2909 2910 4f41aab 2908->2910 2915 4f41801-4f4183d 2909->2915 2916 4f418d3-4f41934 2909->2916 2910->2897 2951 4f41843 call 4f41c58 2915->2951 2952 4f41843 call 4f41eb9 2915->2952 2953 4f41843 call 4f41b4a 2915->2953 2927 4f41935-4f41944 2916->2927 2923 4f41849-4f41884 2925 4f41886-4f418a3 2923->2925 2926 4f418ce-4f418d1 2923->2926 2930 4f418a9-4f418cd 2925->2930 2926->2927 2929 4f4194d-4f4198c 2927->2929 2932 4f41992-4f41a82 2929->2932 2933 4f41a83-4f41a95 2929->2933 2930->2926 2932->2933 2935 4f41a97 2933->2935 2936 4f41a9c 2933->2936 2935->2936 2936->2908 2948->2904 2949->2904 2950->2904 2951->2923 2952->2923 2953->2923 2954->2902 2955->2902
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0ea6a715002760de41939ed6222b028fd46c39a4d098d7666875eba18d52cef5
                                                                                    • Instruction ID: db54feae4b39b69cca6bf6174e31b8d386d24755f7eacec7a0006b34bc2a2540
                                                                                    • Opcode Fuzzy Hash: 0ea6a715002760de41939ed6222b028fd46c39a4d098d7666875eba18d52cef5
                                                                                    • Instruction Fuzzy Hash: 95E1B374E01218CFEB64DFA5D944B9DBBB2FF89300F2081A9D409A7395DB755A86CF20

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2956 da4f08-da4f28 2957 da4f2a 2956->2957 2958 da4f2f-da4fc0 2956->2958 2957->2958 2962 da4fc6-da4fd6 2958->2962 2963 da5314-da5348 2958->2963 3015 da4fd9 call da5358 2962->3015 3016 da4fd9 call da56af 2962->3016 2966 da4fdf-da4fee 3012 da4ff0 call dac158 2966->3012 3013 da4ff0 call dac168 2966->3013 3014 da4ff0 call dac76c 2966->3014 2967 da4ff6-da5012 2969 da5019-da5022 2967->2969 2970 da5014 2967->2970 2971 da5307-da530d 2969->2971 2970->2969 2972 da5313 2971->2972 2973 da5027-da50a1 2971->2973 2972->2963 2978 da515d-da51b8 2973->2978 2979 da50a7-da5115 call da3760 2973->2979 2991 da51b9-da5209 2978->2991 2989 da5158-da515b 2979->2989 2990 da5117-da5157 2979->2990 2989->2991 2990->2989 2996 da520f-da52f1 2991->2996 2997 da52f2-da52fd 2991->2997 2996->2997 2999 da52ff 2997->2999 3000 da5304 2997->3000 2999->3000 3000->2971 3012->2967 3013->2967 3014->2967 3015->2966 3016->2966
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4551367053.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_da0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a5e7eb95b3781912e5f30dc0005eab1dec4edcbe2f73888a8362539db4b28f03
                                                                                    • Instruction ID: 9bec46227c771a01b911f08783a16c3306ddd7cd8158e350422f10a8f4773fd6
                                                                                    • Opcode Fuzzy Hash: a5e7eb95b3781912e5f30dc0005eab1dec4edcbe2f73888a8362539db4b28f03
                                                                                    • Instruction Fuzzy Hash: 44C19174E01218CFDB54DFA9D944BADBBB2FF89300F1091AAD809A7365DB359A85CF10

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 3099 da5358-da5393 3100 da539a-da542d 3099->3100 3101 da5395 3099->3101 3111 da5433-da5445 3100->3111 3112 da5687-da5786 3100->3112 3101->3100 3160 da544a call da5e30 3111->3160 3161 da544a call da5e21 3111->3161 3116 da5788-da578e 3112->3116 3117 da578f-da5796 3112->3117 3115 da5450-da546e 3121 da547d-da5481 3115->3121 3122 da5470-da5474 3115->3122 3116->3117 3123 da5488 3121->3123 3124 da5483 3121->3124 3125 da547b 3122->3125 3126 da5476 3122->3126 3162 da5488 call da75d0 3123->3162 3163 da5488 call da75c0 3123->3163 3164 da5488 call da7560 3123->3164 3124->3123 3125->3123 3126->3125 3127 da548e-da54af 3165 da54b4 call da75d0 3127->3165 3166 da54b4 call da75c0 3127->3166 3167 da54b4 call da7560 3127->3167 3129 da54ba-da54e1 3132 da54e8-da54ef 3129->3132 3133 da54e3 3129->3133 3156 da54f5 call da78a9 3132->3156 3157 da54f5 call da7a40 3132->3157 3133->3132 3134 da54fb-da556d 3140 da556f 3134->3140 3141 da5574-da5578 3134->3141 3140->3141 3142 da557a 3141->3142 3143 da557f-da5584 3141->3143 3142->3143 3144 da558b-da5655 3143->3144 3145 da5586 3143->3145 3152 da566d-da567c 3144->3152 3153 da5657-da566a 3144->3153 3145->3144 3158 da567f call da7e68 3152->3158 3159 da567f call da7e67 3152->3159 3153->3152 3154 da5685-da5686 3154->3112 3156->3134 3157->3134 3158->3154 3159->3154 3160->3115 3161->3115 3162->3127 3163->3127 3164->3127 3165->3129 3166->3129 3167->3129
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4551367053.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_da0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b7b4b398a4d78200d2c50e27ae9cb35045296fe221b6aa1b0172e9fa9872d494
                                                                                    • Instruction ID: 419332aacac4f2dec25530d4b0d4a216fad999aa2d517bb89211ee78def6ab56
                                                                                    • Opcode Fuzzy Hash: b7b4b398a4d78200d2c50e27ae9cb35045296fe221b6aa1b0172e9fa9872d494
                                                                                    • Instruction Fuzzy Hash: 0DA11670D00619CFDB14DFA9D948B9DBBB1FF89300F24926AD408A73A5DB749985CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4551367053.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_da0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 874db8c58e9f5ccf5cb822408e1fa7a171d90bfcdec8ebb2bcc1ed6eaf9c4ebe
                                                                                    • Instruction ID: 97f5cdb1b9711e6603ad570fcd550e0d7d17e0fdae5cc6227463fa2bf4d7f278
                                                                                    • Opcode Fuzzy Hash: 874db8c58e9f5ccf5cb822408e1fa7a171d90bfcdec8ebb2bcc1ed6eaf9c4ebe
                                                                                    • Instruction Fuzzy Hash: 9291F270D00619CFDB10DFA8D948B9CBBB1FF49300F24925AE449AB3A5DB759985CF24
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: de04d739cced60b34ed96ebe9a0dcdcc40581cb7e50c5e2e4433b8a037228229
                                                                                    • Instruction ID: 70869abf33a96508da851dba525cc25e73386a86a86bc3a9b1276d092c70178e
                                                                                    • Opcode Fuzzy Hash: de04d739cced60b34ed96ebe9a0dcdcc40581cb7e50c5e2e4433b8a037228229
                                                                                    • Instruction Fuzzy Hash: 6081B374E00218CFDB58DFAAD9547ADBBF2BF89300F20816AD419AB354DB345986CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6acc095e4792c55b8124a4035def887270206ede37265eedb4f9317da4bd4371
                                                                                    • Instruction ID: 8cb93dde4c9169f3e79f26d628ed2f13026b828d7a6e54f555b481ba2a362dc9
                                                                                    • Opcode Fuzzy Hash: 6acc095e4792c55b8124a4035def887270206ede37265eedb4f9317da4bd4371
                                                                                    • Instruction Fuzzy Hash: 0241C470D002088BEB18DFAAD94479DBBF2BF89300F14C169D418BB294EB755986CF24

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1235 dac76c 1236 dac82b-dac83c 1235->1236 1237 dac83e 1236->1237 1238 dac843-dac84c 1236->1238 1237->1238 1240 dac852-dac865 1238->1240 1241 dac623-dac648 1238->1241 1244 dac86c-dac887 1240->1244 1245 dac867 1240->1245 1242 dac64a 1241->1242 1243 dac64f-dac686 1241->1243 1242->1243 1253 dac688 1243->1253 1254 dac68d-dac6bf 1243->1254 1246 dac889 1244->1246 1247 dac88e-dac8a2 1244->1247 1245->1244 1246->1247 1251 dac8a9-dac8bf LdrInitializeThunk 1247->1251 1252 dac8a4 1247->1252 1255 dac8c1-dac9bf 1251->1255 1252->1251 1253->1254 1261 dac723-dac736 1254->1261 1262 dac6c1-dac6e6 1254->1262 1257 dac9c1-dac9c6 call da5ca8 1255->1257 1258 dac9c7-dac9d1 1255->1258 1257->1258 1266 dac738 1261->1266 1267 dac73d-dac762 1261->1267 1263 dac6e8 1262->1263 1264 dac6ed-dac71b 1262->1264 1263->1264 1264->1261 1266->1267 1270 dac771-dac7a9 1267->1270 1271 dac764-dac765 1267->1271 1272 dac7ab 1270->1272 1273 dac7b0-dac811 call dac168 1270->1273 1271->1240 1272->1273 1279 dac818-dac82a 1273->1279 1280 dac813 1273->1280 1279->1236 1280->1279
                                                                                    APIs
                                                                                    • LdrInitializeThunk.NTDLL(00000000), ref: 00DAC8AE
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4551367053.0000000000DA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DA0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_da0000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID: InitializeThunk
                                                                                    • String ID:
                                                                                    • API String ID: 2994545307-0
                                                                                    • Opcode ID: f1f92fb2074934c4f3a764e7874083fcfb81fa36a4513dab6c64918259558ada
                                                                                    • Instruction ID: 647b82ba40f90e5ef3d196bb68e38e3a4bda4895c103af974a32992c87645435
                                                                                    • Opcode Fuzzy Hash: f1f92fb2074934c4f3a764e7874083fcfb81fa36a4513dab6c64918259558ada
                                                                                    • Instruction Fuzzy Hash: AB11AC74E102198FDB04DFA8D484BADB7F5FB89324F24A225E844A7251D774D842CB30

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 2257 4f48848-4f48d36 2332 4f48d3c-4f48d4c 2257->2332 2333 4f49288-4f492bd 2257->2333 2332->2333 2334 4f48d52-4f48d62 2332->2334 2337 4f492bf-4f492c4 2333->2337 2338 4f492c9-4f492e7 2333->2338 2334->2333 2336 4f48d68-4f48d78 2334->2336 2336->2333 2339 4f48d7e-4f48d8e 2336->2339 2340 4f493ae-4f493b3 2337->2340 2350 4f4935e-4f4936a 2338->2350 2351 4f492e9-4f492f3 2338->2351 2339->2333 2341 4f48d94-4f48da4 2339->2341 2341->2333 2342 4f48daa-4f48dba 2341->2342 2342->2333 2344 4f48dc0-4f48dd0 2342->2344 2344->2333 2345 4f48dd6-4f48de6 2344->2345 2345->2333 2347 4f48dec-4f48dfc 2345->2347 2347->2333 2349 4f48e02-4f48e12 2347->2349 2349->2333 2352 4f48e18-4f49287 2349->2352 2357 4f49381-4f4938d 2350->2357 2358 4f4936c-4f49378 2350->2358 2351->2350 2356 4f492f5-4f49301 2351->2356 2365 4f49326-4f49329 2356->2365 2366 4f49303-4f4930e 2356->2366 2363 4f493a4-4f493a6 2357->2363 2364 4f4938f-4f4939b 2357->2364 2358->2357 2368 4f4937a-4f4937f 2358->2368 2363->2340 2364->2363 2377 4f4939d-4f493a2 2364->2377 2369 4f49340-4f4934c 2365->2369 2370 4f4932b-4f49337 2365->2370 2366->2365 2379 4f49310-4f4931a 2366->2379 2368->2340 2372 4f493b4-4f49410 2369->2372 2373 4f4934e-4f49355 2369->2373 2370->2369 2380 4f49339-4f4933e 2370->2380 2389 4f49412-4f4941d 2372->2389 2390 4f49423-4f4942e 2372->2390 2373->2372 2378 4f49357-4f4935c 2373->2378 2377->2340 2378->2340 2379->2365 2386 4f4931c-4f49321 2379->2386 2380->2340 2386->2340 2389->2390 2394 4f494a6-4f494f8 2389->2394 2395 4f49434-4f49491 2390->2395 2396 4f494ff-4f4953b 2390->2396 2394->2396 2406 4f4949a-4f494a3 2395->2406 2410 4f49542-4f49544 2396->2410 2411 4f4953d call 4f482c0 2396->2411 2412 4f49555-4f49563 2410->2412 2413 4f49546-4f49553 2410->2413 2411->2410 2421 4f49565-4f4956f 2412->2421 2422 4f49571 2412->2422 2420 4f49573-4f49576 2413->2420 2421->2420 2422->2420
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f18459a04fa0d5ec105996dbf969fbc11b3f10424816724396630aee38d6ea38
                                                                                    • Instruction ID: b992ea8208533ae1d60a8d55e441f88f36c1447015f37d6e1d9b583dd6bd4a0c
                                                                                    • Opcode Fuzzy Hash: f18459a04fa0d5ec105996dbf969fbc11b3f10424816724396630aee38d6ea38
                                                                                    • Instruction Fuzzy Hash: B5722470A00219CFEB149FE4C850B9EBFB6EFC4300F1081A9D50AA73A5DE759E869F51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 3168 4f465f1-4f4660d 3169 4f46615-4f46617 3168->3169 3170 4f4660f-4f46613 3168->3170 3172 4f46828-4f4682f 3169->3172 3170->3169 3171 4f4661c-4f46627 3170->3171 3173 4f46830 3171->3173 3174 4f4662d-4f46634 3171->3174 3177 4f46835-4f4686d 3173->3177 3175 4f467c9-4f467cf 3174->3175 3176 4f4663a-4f46649 3174->3176 3179 4f467d5-4f467d9 3175->3179 3180 4f467d1-4f467d3 3175->3180 3176->3177 3178 4f4664f-4f4665e 3176->3178 3198 4f46876-4f4687a 3177->3198 3199 4f4686f-4f46874 3177->3199 3186 4f46660-4f46663 3178->3186 3187 4f46673-4f46676 3178->3187 3181 4f46826 3179->3181 3182 4f467db-4f467e1 3179->3182 3180->3172 3181->3172 3182->3173 3184 4f467e3-4f467e6 3182->3184 3184->3173 3188 4f467e8-4f467fd 3184->3188 3189 4f46665-4f46668 3186->3189 3190 4f46682-4f46688 3186->3190 3187->3190 3191 4f46678-4f4667b 3187->3191 3208 4f46821-4f46824 3188->3208 3209 4f467ff-4f46805 3188->3209 3193 4f4666e 3189->3193 3194 4f46769-4f4676f 3189->3194 3200 4f466a0-4f466bd 3190->3200 3201 4f4668a-4f46690 3190->3201 3195 4f4667d 3191->3195 3196 4f466ce-4f466d4 3191->3196 3205 4f46794-4f467a1 3193->3205 3202 4f46787-4f46791 3194->3202 3203 4f46771-4f46777 3194->3203 3195->3205 3206 4f466d6-4f466dc 3196->3206 3207 4f466ec-4f466fe 3196->3207 3204 4f46880-4f46882 3198->3204 3199->3204 3240 4f466c6-4f466c9 3200->3240 3210 4f46694-4f4669e 3201->3210 3211 4f46692 3201->3211 3202->3205 3212 4f46779 3203->3212 3213 4f4677b-4f46785 3203->3213 3219 4f46884-4f46896 3204->3219 3220 4f46897-4f4689e 3204->3220 3231 4f467b5-4f467b7 3205->3231 3232 4f467a3-4f467a7 3205->3232 3215 4f466e0-4f466ea 3206->3215 3216 4f466de 3206->3216 3226 4f46700-4f4670c 3207->3226 3227 4f4670e-4f46731 3207->3227 3208->3172 3217 4f46817-4f4681a 3209->3217 3218 4f46807-4f46815 3209->3218 3210->3200 3211->3200 3212->3202 3213->3202 3215->3207 3216->3207 3217->3173 3224 4f4681c-4f4681f 3217->3224 3218->3173 3218->3217 3224->3208 3224->3209 3242 4f46759-4f46767 3226->3242 3227->3173 3244 4f46737-4f4673a 3227->3244 3236 4f467bb-4f467be 3231->3236 3232->3231 3235 4f467a9-4f467ad 3232->3235 3235->3173 3241 4f467b3 3235->3241 3236->3173 3237 4f467c0-4f467c3 3236->3237 3237->3175 3237->3176 3240->3205 3241->3236 3242->3205 3244->3173 3246 4f46740-4f46752 3244->3246 3246->3242
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: eea5423d988f62740d321bfafefac4ea55b71d569c34ec96e75f9129d4f773bc
                                                                                    • Instruction ID: 0073e2fee6733cf4bed13fc653c7824d14df01c44ccae3d95b64ca7e7679bcf7
                                                                                    • Opcode Fuzzy Hash: eea5423d988f62740d321bfafefac4ea55b71d569c34ec96e75f9129d4f773bc
                                                                                    • Instruction Fuzzy Hash: 86817C75F001058FEB14CFA9C884A6ABBB2BFCA314B158169D415DB365DF39F842CB90

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 3248 4f462a8-4f462b6 3249 4f462c5-4f462d6 call 4f42a50 3248->3249 3250 4f462b8-4f462be 3248->3250 3253 4f462dc-4f462e0 3249->3253 3254 4f4636a-4f4636c 3249->3254 3250->3249 3255 4f462f0-4f462fd 3253->3255 3256 4f462e2-4f462ee 3253->3256 3320 4f4636e call 4f46130 3254->3320 3321 4f4636e call 4f462a8 3254->3321 3262 4f462ff-4f46309 3255->3262 3256->3262 3257 4f46374-4f4637a 3259 4f46386-4f4638d 3257->3259 3260 4f4637c-4f46382 3257->3260 3263 4f46384 3260->3263 3264 4f463e8-4f46447 3260->3264 3267 4f46336-4f4633a 3262->3267 3268 4f4630b-4f4631a 3262->3268 3263->3259 3279 4f4644e-4f4647e 3264->3279 3270 4f46346-4f4634a 3267->3270 3271 4f4633c-4f46342 3267->3271 3276 4f4631c-4f46323 3268->3276 3277 4f4632a-4f46334 3268->3277 3270->3259 3273 4f4634c-4f46350 3270->3273 3274 4f46344 3271->3274 3275 4f46390-4f463e1 3271->3275 3278 4f46356-4f46368 3273->3278 3273->3279 3274->3259 3275->3264 3276->3277 3277->3267 3278->3259 3291 4f46480-4f4648d 3279->3291 3292 4f464a3-4f464b0 3279->3292 3298 4f4649f-4f464a1 3291->3298 3299 4f4648f-4f4649d 3291->3299 3297 4f464b2-4f464bc 3292->3297 3305 4f464e4-4f464e6 call 4f465f1 3297->3305 3306 4f464be-4f464cc 3297->3306 3298->3297 3299->3297 3309 4f464ec-4f464f0 3305->3309 3311 4f464ce-4f464d2 3306->3311 3312 4f464d9-4f464e2 3306->3312 3313 4f464f2-4f46507 3309->3313 3314 4f46509-4f4650d 3309->3314 3311->3312 3312->3305 3316 4f4652b-4f46531 3313->3316 3315 4f4650f-4f46524 3314->3315 3314->3316 3315->3316 3320->3257 3321->3257
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bdfb76008b205b83dbb69a7af577b890bd1b5992b1091e7aec1c391b817d4d37
                                                                                    • Instruction ID: 66136eb45f7d53e60a8640cd5a8b3e768db4bce041055dc9ee394a8a88b7b1c7
                                                                                    • Opcode Fuzzy Hash: bdfb76008b205b83dbb69a7af577b890bd1b5992b1091e7aec1c391b817d4d37
                                                                                    • Instruction Fuzzy Hash: 0071A131B042518FEB159B78D89463E7BE2BBCA740B148469E506CB399EF38DC43CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: df0015dea626814bc3de6cda0d475372d33562feddb48e3a1a9d564b32f885a6
                                                                                    • Instruction ID: ab5b994f64563a27c040cceabbbcbd85b727e9bf595b58941dac20de6e1a7d36
                                                                                    • Opcode Fuzzy Hash: df0015dea626814bc3de6cda0d475372d33562feddb48e3a1a9d564b32f885a6
                                                                                    • Instruction Fuzzy Hash: 7171B231F002199BDB15EFB4C8506AEBBF2AFC8740F14456AE405AB380DF30AD46CBA5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ffebd1f4ee4681aab00c3add1b3e059f5aafaaa32aa2445c537ed2025eb64adc
                                                                                    • Instruction ID: d6fd3c20733d319221b715fd53cf07ffd808e2f32d3b51f28934157c60f5b20e
                                                                                    • Opcode Fuzzy Hash: ffebd1f4ee4681aab00c3add1b3e059f5aafaaa32aa2445c537ed2025eb64adc
                                                                                    • Instruction Fuzzy Hash: 8B517339B141158FC794EF39D89896A7FE9BF8979430548AAE406CB361EF31EC02CB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6ea3c2cc2db9695ea0c3f1dd47f2e4f05c6a25017b3b680b3ab8c083b0e3979e
                                                                                    • Instruction ID: 94e77a5029e2505e82aa2fda885bad49807bda165a6539fca02c0b6f033a833a
                                                                                    • Opcode Fuzzy Hash: 6ea3c2cc2db9695ea0c3f1dd47f2e4f05c6a25017b3b680b3ab8c083b0e3979e
                                                                                    • Instruction Fuzzy Hash: DE51C031B042559FEB158F64D844BBA7FE2FBCA304F048969E845CB385DB38E902CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 393cdb5500e497bdd937e9d22bcf97f8ccc07b3be7d0e6b976336075999ac6d5
                                                                                    • Instruction ID: 1672d8015484c9dc180636b618ccf7fa49bfbe929d3c01742df7d8fbe38cbca8
                                                                                    • Opcode Fuzzy Hash: 393cdb5500e497bdd937e9d22bcf97f8ccc07b3be7d0e6b976336075999ac6d5
                                                                                    • Instruction Fuzzy Hash: 75819074E412699FDB64DF69DC50BEDBBB2BB89300F1080EAD909A7254EB355E81CF40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7ccf94ec68b12f7d939f5bd6054fe07d82d1924e189877c012d3f7a89c729d2b
                                                                                    • Instruction ID: 1757e36f61018d927f4e421dc8088dae36843e325851380541aba9b0fe2b3a07
                                                                                    • Opcode Fuzzy Hash: 7ccf94ec68b12f7d939f5bd6054fe07d82d1924e189877c012d3f7a89c729d2b
                                                                                    • Instruction Fuzzy Hash: AE41FF357006018FE729AB39D854A6A7FE2EFC5310F0545ADE54ACB7A0EF68EC068791
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: dcaef35c009fdc333ffd9ab4819e557f1447dff2823a58f152672036a7f9aa50
                                                                                    • Instruction ID: 5c96d7b1e6dfa2868e1e926169c2cbca03f40bba846a3d2386d3aadbba65fbbd
                                                                                    • Opcode Fuzzy Hash: dcaef35c009fdc333ffd9ab4819e557f1447dff2823a58f152672036a7f9aa50
                                                                                    • Instruction Fuzzy Hash: FD414F71E012599BDB14DFA5C890AEEBBF5AFC8740F25816AE405B7240EF70A946CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6bf98e9402fcd0217bf8620515eee93dc6538939e01bb93e5af67e97237edbf0
                                                                                    • Instruction ID: a6a29a3bcb859ed5cc9dd983ebf80c421963bbc3cba6fe314a7f7bbecb104c50
                                                                                    • Opcode Fuzzy Hash: 6bf98e9402fcd0217bf8620515eee93dc6538939e01bb93e5af67e97237edbf0
                                                                                    • Instruction Fuzzy Hash: 8F414879B041159FCB15AF68D888ABE3BB1BF88350F104069F906CB3A1DB71ED52CB51
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d6a642ff1773a6b3c0c6ace61b259be80152e6da491839dc1ba66ddee3c41755
                                                                                    • Instruction ID: 14efa65b70e21f6c487c4b9db4cd3e23057ad1c91d49d4a43ce23dd1888517f5
                                                                                    • Opcode Fuzzy Hash: d6a642ff1773a6b3c0c6ace61b259be80152e6da491839dc1ba66ddee3c41755
                                                                                    • Instruction Fuzzy Hash: 3F41C531A05259EFCF01AFA8D8546BE3FA2EB88310F04445AF91987355DF38DA62DB60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0d34556c21aed8e906c8a340ba6ad4f1dccb62649adb1d2aaa9e9da30ef4fe6c
                                                                                    • Instruction ID: 71ac67f6525b2f1e2e38ce536b4bb51d7243cd22c033f06fb54e916f693d619d
                                                                                    • Opcode Fuzzy Hash: 0d34556c21aed8e906c8a340ba6ad4f1dccb62649adb1d2aaa9e9da30ef4fe6c
                                                                                    • Instruction Fuzzy Hash: 85212738B052414BDB247B3A98A427D3E87AFC8794B14807AD905CB399EE79DC43E380
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fbaab9790095d6152ea5d91fdef159e2734c137c111213c356f3cf5af50a0e92
                                                                                    • Instruction ID: f46116cb5707bfc4edbc83a16959abb6b3698d1158c77a60f4a77bf96472cb8a
                                                                                    • Opcode Fuzzy Hash: fbaab9790095d6152ea5d91fdef159e2734c137c111213c356f3cf5af50a0e92
                                                                                    • Instruction Fuzzy Hash: 1A21A639B081558BC754EE669C9467B7FEAEBC5380B14482AE911CB344EF71EC129760
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4551134310.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_c7d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 04bebf822e145d99656c5f75efde48a3c8f6b748b981156b02a234582eecb0b7
                                                                                    • Instruction ID: f677648db3779c8294debddd16a2006b5d2c0205c458fd654ddcc767bfcbb52c
                                                                                    • Opcode Fuzzy Hash: 04bebf822e145d99656c5f75efde48a3c8f6b748b981156b02a234582eecb0b7
                                                                                    • Instruction Fuzzy Hash: A421DEB5604244EFDB14DF14D980B26BBB5FF84314F24C56DE90E4A292C77AD846CA62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4551134310.0000000000C7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C7D000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_c7d000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f11ffdd52b214c89809a91d99fb876ff83ca4121dbc0426d004375cf6f04da29
                                                                                    • Instruction ID: 01eaddc69d9b9af212e870cd0d3fb0d0ba9ffd843605a09945e1acd30995bc63
                                                                                    • Opcode Fuzzy Hash: f11ffdd52b214c89809a91d99fb876ff83ca4121dbc0426d004375cf6f04da29
                                                                                    • Instruction Fuzzy Hash: 14214B7150D3C09FC703CB24D990711BF71AF46214F29C5EBD8898F2A7C23A980ACB62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2b781bd37d3257f3e6c4ae4b08e5985e79b5292d2f9e16a9823c6109c3c69610
                                                                                    • Instruction ID: ebe350033444275bfaa5d26ba7c3851c7b432fbcc389c24a253bb28a1ea441c1
                                                                                    • Opcode Fuzzy Hash: 2b781bd37d3257f3e6c4ae4b08e5985e79b5292d2f9e16a9823c6109c3c69610
                                                                                    • Instruction Fuzzy Hash: 1A112632B083985FDB066F7458206AE3FA3AFCA250B0448ABE505DB392DE344D0687A5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3bd84d85c722df93e155a0313dfb820db281b5228a9da3674738021acd27220b
                                                                                    • Instruction ID: 223356ede368a7e9456198d564874b29c36e639ffe42706ceb7514031c1c2af1
                                                                                    • Opcode Fuzzy Hash: 3bd84d85c722df93e155a0313dfb820db281b5228a9da3674738021acd27220b
                                                                                    • Instruction Fuzzy Hash: AE1126B2800349DFDB10CF99D944BEEBFF4EB48320F158459EA18A7250D779A550DFA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 258991a72b8de3fb9839a6555ffcea0adb33e62a1e65f5e88b3419937a540027
                                                                                    • Instruction ID: 65e862c063bcbae18f6dcdbb8616253b41c5ffa6598c11fdceddeccefcfb6f30
                                                                                    • Opcode Fuzzy Hash: 258991a72b8de3fb9839a6555ffcea0adb33e62a1e65f5e88b3419937a540027
                                                                                    • Instruction Fuzzy Hash: A8110039F402598FDB00DFF8D954BAEBBF5AB88311F009161E858E7355EB71A9838B50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 218fff4c4e8437491f816cf34e4db241049634637cee5faaedcc045b8e85eb20
                                                                                    • Instruction ID: 2fb3caa4bd8861699aa71e51d9f5e04ea576faebb8e799c9c7e726f3f66af0ab
                                                                                    • Opcode Fuzzy Hash: 218fff4c4e8437491f816cf34e4db241049634637cee5faaedcc045b8e85eb20
                                                                                    • Instruction Fuzzy Hash: 8C110630A00B418FD735AB2DC444B6ABFA2AFC0314F04965DD25A8B565EFB4F80A8792
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ba52531ff2717ff0fdac81a91ec1c8e9bbb9cb310c2e8f2867ca7a080c705c6e
                                                                                    • Instruction ID: 6be209a9616cc545730624918161a8e8ad224f2483a18066808ce1a673f64995
                                                                                    • Opcode Fuzzy Hash: ba52531ff2717ff0fdac81a91ec1c8e9bbb9cb310c2e8f2867ca7a080c705c6e
                                                                                    • Instruction Fuzzy Hash: 741167B6800249DFDB10CF99C944BDEBFF4EF48320F148459E518A7250D779A654DFA1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 51f3bd93b1f73c2d46368aeda93769a6b82b759d4503ce2b489380395b13d340
                                                                                    • Instruction ID: 21a5d80409b051168960819df8f1a299435b8212c967da14d156c91eef824a87
                                                                                    • Opcode Fuzzy Hash: 51f3bd93b1f73c2d46368aeda93769a6b82b759d4503ce2b489380395b13d340
                                                                                    • Instruction Fuzzy Hash: 18018632B041286F9B059E599C10AAF3FDBDBC9B50F18802AF509D7284DE75DD1297A4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: eba88008631075937a73b7f84d4a455ef55cd3dd6ef4bab1ebfcb70801e1f6d1
                                                                                    • Instruction ID: 4ca531de17a8cc82720c90b1b16451bfa42152459e1307d2b0d58c2905890c4f
                                                                                    • Opcode Fuzzy Hash: eba88008631075937a73b7f84d4a455ef55cd3dd6ef4bab1ebfcb70801e1f6d1
                                                                                    • Instruction Fuzzy Hash: 84012673A081586FDB028E949C40ADF3FA6DBC5740B08806AF504C7181EA358A1297A0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 93fd17a53e1a55070da5ef40cf4bcc3e7cee12def28a4acdbe9e17803603e9b7
                                                                                    • Instruction ID: 5a6c323315b0012f4ebae8c93e78ead337dca35cce6a711a94e5b8b04f25ec5e
                                                                                    • Opcode Fuzzy Hash: 93fd17a53e1a55070da5ef40cf4bcc3e7cee12def28a4acdbe9e17803603e9b7
                                                                                    • Instruction Fuzzy Hash: 3AD012719052598FD71AEB78ECC94643F72EA90700700969ED0055A4AFDEFC1A5F9740
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9d382b23c85a6a59109d4470ba12842baf79699655183424e73323ff54532569
                                                                                    • Instruction ID: 28f36ae2ceded45a74854d9a6bd567fc07cecf5f5350da9f07bd2fe6c6e247cd
                                                                                    • Opcode Fuzzy Hash: 9d382b23c85a6a59109d4470ba12842baf79699655183424e73323ff54532569
                                                                                    • Instruction Fuzzy Hash: 0ED0673AB401089FCB049F98E8909DDF7B6FB98621B148526E915E3264C7719925DB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c07ef10514e0f31abc3e9902eb35aa3c0e350618d81a2709b5c2381aa3f9d2b7
                                                                                    • Instruction ID: 45f6e9fa74dfda57fd8ad90b524ec436329cd6938ac38c2b75890e9bd4c9808f
                                                                                    • Opcode Fuzzy Hash: c07ef10514e0f31abc3e9902eb35aa3c0e350618d81a2709b5c2381aa3f9d2b7
                                                                                    • Instruction Fuzzy Hash: 2AC012304043198ED509F779F8455253B9AE6C0700B409919A1091515DDFFC59565690
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fc37203a6c2977554d69062cea0acf92e4ff37accd42eb54a468a3a1abc426b7
                                                                                    • Instruction ID: 269e6e3f4eb077837743090c823ec6a243ce7a40824fb2f1ffb1e9eb11e8d6fe
                                                                                    • Opcode Fuzzy Hash: fc37203a6c2977554d69062cea0acf92e4ff37accd42eb54a468a3a1abc426b7
                                                                                    • Instruction Fuzzy Hash: C8C1A174E01218CFDB54DFA9D944BADBBB2FF89300F2081A9D509AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 87afbb71081572874152f6ce0e3710533e95ec1988d4bd37c703cae263359212
                                                                                    • Instruction ID: 02abb505b4c07ed9d73da263a1d547c5022149827dd74986a41326a420708f89
                                                                                    • Opcode Fuzzy Hash: 87afbb71081572874152f6ce0e3710533e95ec1988d4bd37c703cae263359212
                                                                                    • Instruction Fuzzy Hash: 8CC19274E01218CFEB54DFA9C984B9DBBB2FF89300F1081A9D409AB355DB359A86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a77258a3ecfe615e8f7dd3ea7c6bbd994bc2fcdd33cb2148eddf7775039ae893
                                                                                    • Instruction ID: 661bdb8e159c3f895a6e217bdad9fe8cba4bcf175d3e6a8fb84de7a49fa24a72
                                                                                    • Opcode Fuzzy Hash: a77258a3ecfe615e8f7dd3ea7c6bbd994bc2fcdd33cb2148eddf7775039ae893
                                                                                    • Instruction Fuzzy Hash: 3DC1A174E01258CFDB54DFA9C984BADBBB2FF89300F1091A9D409AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7523de9e17bf2dea2d515ba10f776d681dbbe7914594bbfebcdd24a8d6416585
                                                                                    • Instruction ID: a6d9290ac9a776cf02bf133abf9fdf5335213daa8963e2d27e40f31b3c469c18
                                                                                    • Opcode Fuzzy Hash: 7523de9e17bf2dea2d515ba10f776d681dbbe7914594bbfebcdd24a8d6416585
                                                                                    • Instruction Fuzzy Hash: 65C19174E01218CFDB54DFA9C944BADBBB2FF89300F1491A9D409AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d51a290514915256cf05ef927ad6246067edc3d80842c33babda6f4fea34c522
                                                                                    • Instruction ID: f064f083b371d4e6ca0f5b65a7ae881a15ff943227f9a07506fab75f0c5906d4
                                                                                    • Opcode Fuzzy Hash: d51a290514915256cf05ef927ad6246067edc3d80842c33babda6f4fea34c522
                                                                                    • Instruction Fuzzy Hash: 57C1A174E01218CFDB54DFA9C944BADBBB2FF89300F1081A9D409AB355DB359A86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f10ad54fa50064f7cb66aea4df44bc84db7fdaa1874860627343ebb1c64b2f83
                                                                                    • Instruction ID: 60ba3b6ea2bacfbf6723a39e6977fdf917fe613f4bba65f9417f46d81037f86a
                                                                                    • Opcode Fuzzy Hash: f10ad54fa50064f7cb66aea4df44bc84db7fdaa1874860627343ebb1c64b2f83
                                                                                    • Instruction Fuzzy Hash: 2EC1A274E01218CFEB54DFA9C944BADBBB2FF89300F1091A9D409AB355DB359A82CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 41368c31bde22e372c813e60415fea1f28fbd1263286698ffc7324407bcd2f77
                                                                                    • Instruction ID: 7272abe00987ffb0396e550b8ca29a345c8dd8470db6319c5499b0e3269f645c
                                                                                    • Opcode Fuzzy Hash: 41368c31bde22e372c813e60415fea1f28fbd1263286698ffc7324407bcd2f77
                                                                                    • Instruction Fuzzy Hash: 3FC19174E01218CFDB54DFA9C984BADBBB2FF89300F1091A9D409AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: e1101b0cc0552a31651cd877ad29fa680303f0f58f3e5f6fc74dd55e8b6eb8ee
                                                                                    • Instruction ID: 4cc90e92bf98d1390116e4d781a3c9c2833ffe1613296dcea1b202d2341e8d66
                                                                                    • Opcode Fuzzy Hash: e1101b0cc0552a31651cd877ad29fa680303f0f58f3e5f6fc74dd55e8b6eb8ee
                                                                                    • Instruction Fuzzy Hash: 75C19174E01218CFDB54DFA9C944BADBBB2FF89300F1091A9D809AB355DB359A86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 864d28e52adc87d74c229d7372a16701419a6b1b954ced0eda7f7d35af4432fe
                                                                                    • Instruction ID: 6567b5e3f77665c9bb334c11d5e487ec6d86a8647f25ec8948a4b4f3110f73d2
                                                                                    • Opcode Fuzzy Hash: 864d28e52adc87d74c229d7372a16701419a6b1b954ced0eda7f7d35af4432fe
                                                                                    • Instruction Fuzzy Hash: 75C1A174E01218CFDB54DFA9D944BADBBB2FF89300F1081A9D409AB365DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 4ed1387d0a005ade6e7deffa7257dbd64b56ec51fdc4d6185459a41c12ef0386
                                                                                    • Instruction ID: 22a5f69ee24555be079950c9a020eb5c488e8cba8de2760c24f01961ff22db5b
                                                                                    • Opcode Fuzzy Hash: 4ed1387d0a005ade6e7deffa7257dbd64b56ec51fdc4d6185459a41c12ef0386
                                                                                    • Instruction Fuzzy Hash: 66C19274E01218CFDB54DFA9C984B9DBBB2FF89300F1091A9D409AB355DB359A86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6f2f1c0244cae43e389bc797486ace2ec62bde0cdcd9577e36f63a0429456aa8
                                                                                    • Instruction ID: 40ac4347c7688585cc3572e677ec9267778f071f00e71597f1f063c395e6dd13
                                                                                    • Opcode Fuzzy Hash: 6f2f1c0244cae43e389bc797486ace2ec62bde0cdcd9577e36f63a0429456aa8
                                                                                    • Instruction Fuzzy Hash: 59C19274E01218CFDB54DFA5C984BADBBB2FF89300F1091A9D409AB355DB35AA86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fdd16e7d6818b3b7d8cf9544e9c7a70614e5462414fe629ed3af5e345859b230
                                                                                    • Instruction ID: 5d2321aa3e495648861badac6f3f23a7231cc65ab91b52b467be15652e4c124f
                                                                                    • Opcode Fuzzy Hash: fdd16e7d6818b3b7d8cf9544e9c7a70614e5462414fe629ed3af5e345859b230
                                                                                    • Instruction Fuzzy Hash: 69C19274E01218CFEB54DFA9C944B9DBBB2FF89300F1091A9D409AB355DB359A86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 53ab05db33c5de088960d81833e092b958424c81ff4994495509c6fd39f32596
                                                                                    • Instruction ID: b338d21305914d4838efc53868cced3d9ebdc9fb7c817f5ca66eacc6da80e1f3
                                                                                    • Opcode Fuzzy Hash: 53ab05db33c5de088960d81833e092b958424c81ff4994495509c6fd39f32596
                                                                                    • Instruction Fuzzy Hash: 3CC1A274E01218CFDB54DFA9C944B9DBBB2FF89300F1081A9D409AB355DB359A86CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b9ca31ceb78b29e0491636568c0a64213f921d462e356a0ae42976d24080077a
                                                                                    • Instruction ID: 5445a982ddf61d24ac72476390c85dea438375424b4508f2b0275068e6d89538
                                                                                    • Opcode Fuzzy Hash: b9ca31ceb78b29e0491636568c0a64213f921d462e356a0ae42976d24080077a
                                                                                    • Instruction Fuzzy Hash: 2CC1A174E01218CFDB54DFA9D944BADBBB2FF89300F1081A9D409AB355DB359A86CF20
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3e338919c1e2eaa823e1ed9f56c9c98c7fe74b93227dfa76c94c97272307b591
                                                                                    • Instruction ID: 18619e28378a1fe4dfa08b582307da9b5e26cb633712f60dcb331d039eafba86
                                                                                    • Opcode Fuzzy Hash: 3e338919c1e2eaa823e1ed9f56c9c98c7fe74b93227dfa76c94c97272307b591
                                                                                    • Instruction Fuzzy Hash: 98C19274E01218CFEB54DFA9C944B9DBBB2FF89300F1091A9D409AB355DB359A86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cd4a28daa7f584a8258076d5010756b2f49d4f8612a13bfdb6f5a98b50be9b83
                                                                                    • Instruction ID: bdcf67d1527d9ba0b491da9282227900bb33dceac0210b1f284427b4fb6dd4f3
                                                                                    • Opcode Fuzzy Hash: cd4a28daa7f584a8258076d5010756b2f49d4f8612a13bfdb6f5a98b50be9b83
                                                                                    • Instruction Fuzzy Hash: F3C1A174E01258CFDB54DFA9C984BADBBB2FF89300F1091A9D409AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3a21d1b1db0ebea3ab32e6b676da0deeb0ea1dcf275fe42d53afede8f896a487
                                                                                    • Instruction ID: 3ee3895391280526cb2c126b53aeed9e79e7318d19ef917861198274f9ac62a9
                                                                                    • Opcode Fuzzy Hash: 3a21d1b1db0ebea3ab32e6b676da0deeb0ea1dcf275fe42d53afede8f896a487
                                                                                    • Instruction Fuzzy Hash: FCC19074E01218CFDB54DFA9D954BADBBB2FF89300F1081A9D409AB355DB359A86CF20
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7d62d4244ea97dc23e3fb452a4ef615e678e93d1d64443acf241e91fd8a48594
                                                                                    • Instruction ID: 0cc757be8d0f30092cb7ddc94f66cb3a7dfca2bbfcf166ce07dc19cc0ce4595a
                                                                                    • Opcode Fuzzy Hash: 7d62d4244ea97dc23e3fb452a4ef615e678e93d1d64443acf241e91fd8a48594
                                                                                    • Instruction Fuzzy Hash: 8CC1A274E01258CFDB54DFA9C944B9DBBB2FF89300F1091A9D409AB355DB355A82CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: a4e21e4699671d778c9a91665c0c435e7279e53ba02e0a704ce579868a7af295
                                                                                    • Instruction ID: d987670b81a8b9429c2b18fe49dca77daf2def6a7c67f086a5aee491cace5e39
                                                                                    • Opcode Fuzzy Hash: a4e21e4699671d778c9a91665c0c435e7279e53ba02e0a704ce579868a7af295
                                                                                    • Instruction Fuzzy Hash: FBC1A174E01218CFDB54DFA9C984BADBBB2FF89300F1491A9D409AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8cc34a1d7a5de60b1210655617f6c7f76acde6bada92c413a88020a3c2298733
                                                                                    • Instruction ID: 35a223eb49de1135c6265c0d00c695c0a0a37b7f05a5c82617915efa414fe9ae
                                                                                    • Opcode Fuzzy Hash: 8cc34a1d7a5de60b1210655617f6c7f76acde6bada92c413a88020a3c2298733
                                                                                    • Instruction Fuzzy Hash: ACC19074E01218CFDB54DFA9C944BADBBB2EF89300F5081A9D409AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 89785e734c3d7ed47b5146291ae63d6ad70d3fcbd689c6a8aa5bc8fdfec24528
                                                                                    • Instruction ID: b553046a21e5b072b69dcf263e526198788bf9251046102aba3547fb0d5ea150
                                                                                    • Opcode Fuzzy Hash: 89785e734c3d7ed47b5146291ae63d6ad70d3fcbd689c6a8aa5bc8fdfec24528
                                                                                    • Instruction Fuzzy Hash: 32C19174E01218CFEB54DFA5C984B9DBBB2FF89300F1491A9D409AB395DB355A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: bfbf4fac5686b5f36a9acb6eed78c9c10dfcbb437eabf5af9cad868590d31c63
                                                                                    • Instruction ID: ba62d369e6aa896cd4f2a907395daa574a53d158fe933a420fd9b679da2bce6a
                                                                                    • Opcode Fuzzy Hash: bfbf4fac5686b5f36a9acb6eed78c9c10dfcbb437eabf5af9cad868590d31c63
                                                                                    • Instruction Fuzzy Hash: 76C19174E01218CFDB54DFA5D984BADBBB2FF89300F1091A9D409AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 51e5d35508a7a9f52401f2ad5af558faaf3d25cc024af2d880fb513c78ae3417
                                                                                    • Instruction ID: 15104e6c7d1e738d23d17e339ffdefc69831650611c1b562d948cf6fdf6f10c0
                                                                                    • Opcode Fuzzy Hash: 51e5d35508a7a9f52401f2ad5af558faaf3d25cc024af2d880fb513c78ae3417
                                                                                    • Instruction Fuzzy Hash: 79C19174E01218CFDB54DFA9C944BADBBB2FF89300F1081A9D409AB355DB359A86CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: ac5877417cdca020b6f4ffa4c6ec0110b84c7e17272334fc49e721bdf69cb145
                                                                                    • Instruction ID: d2a2acbac2233432f47053771ae84186d6dbf18ec1ef8aa5ce0a8ca979cbf1af
                                                                                    • Opcode Fuzzy Hash: ac5877417cdca020b6f4ffa4c6ec0110b84c7e17272334fc49e721bdf69cb145
                                                                                    • Instruction Fuzzy Hash: F1C19174E01218CFDB54DFA9C984BADBBB2FF89300F1091A9D409AB355DB359A86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3d2722c01be4ae896124b9a4556a8b82ae59bd560c65f2d17a18fbc50a47502a
                                                                                    • Instruction ID: 9bfa2ed3cd9dc546126b01360d0330a9a1892476ea57d1c17daeef904c26cddc
                                                                                    • Opcode Fuzzy Hash: 3d2722c01be4ae896124b9a4556a8b82ae59bd560c65f2d17a18fbc50a47502a
                                                                                    • Instruction Fuzzy Hash: FBC19174E01218CFDB54DFA5C944B9DBBB2FF89300F1091A9D409AB395DB359A86CF60
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 829910f131543316c0066092cb05691fedbaf54ee521b5d2e428f4fa6ec3d2fd
                                                                                    • Instruction ID: 7f0167c4c953ee5d6abf53ce57d92316c91eab2cb905851ac0dd963e14d9ca5f
                                                                                    • Opcode Fuzzy Hash: 829910f131543316c0066092cb05691fedbaf54ee521b5d2e428f4fa6ec3d2fd
                                                                                    • Instruction Fuzzy Hash: 60C19174E01218CFEB54DFA5C984BADBBB2FF89300F1481A9D409AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b226c1a0713cf99aeab0c44b2019197e1dfaa73b79a520345a744baa874bbd32
                                                                                    • Instruction ID: 6ab13848af58fa66cf3506ac3a4bebfd5d94028d9f933724071ace19e01180bc
                                                                                    • Opcode Fuzzy Hash: b226c1a0713cf99aeab0c44b2019197e1dfaa73b79a520345a744baa874bbd32
                                                                                    • Instruction Fuzzy Hash: 86C19174E01218CFEB54DFA9C954BADBBB2FF89300F1091A9D409AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 04a425bb93840634e259d7cddfbe9405b77a314b2f01cec9d37a17f4d5cd420b
                                                                                    • Instruction ID: ea981afbd700cd619e1d574b175edb127c24c49fb80df9a581cd580075295664
                                                                                    • Opcode Fuzzy Hash: 04a425bb93840634e259d7cddfbe9405b77a314b2f01cec9d37a17f4d5cd420b
                                                                                    • Instruction Fuzzy Hash: 77C19174E01218CFDB54DFA9C944BADBBB2FF89300F1491A9D809AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 83c03a502d929fed2282d77159aead12122919821ae300311675eadaaf31d9c2
                                                                                    • Instruction ID: fda3cffc166fdc1f6bacc88a7589905554f836db44b4f7999eb4fc14f13d938f
                                                                                    • Opcode Fuzzy Hash: 83c03a502d929fed2282d77159aead12122919821ae300311675eadaaf31d9c2
                                                                                    • Instruction Fuzzy Hash: 03C19274E01218CFDB54DFA5C994BADBBB2FF89300F1081A9D409AB355DB35AA86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 65223c2631f1dc479fc5662de8c75a39119c219eb958507f3ca6f2bebc48414c
                                                                                    • Instruction ID: 7d94667db84f05a441cbc445dfb4e39134e1c63f3c7e8b519a3a4a06c91f0dcf
                                                                                    • Opcode Fuzzy Hash: 65223c2631f1dc479fc5662de8c75a39119c219eb958507f3ca6f2bebc48414c
                                                                                    • Instruction Fuzzy Hash: 3BC19274E01218CFDB54DFA5C944BADBBB2FF89300F1091A9D809AB355DB359A86CF50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c8f95ba0c3f1be441c2748c6a5792b61a9f9d9de1d4504311b0126a21b99914b
                                                                                    • Instruction ID: e79c2987dede46aa97cbc94e401633a0c477fc9d9e863a9762afa2a3855f7baf
                                                                                    • Opcode Fuzzy Hash: c8f95ba0c3f1be441c2748c6a5792b61a9f9d9de1d4504311b0126a21b99914b
                                                                                    • Instruction Fuzzy Hash: D2C19274E01218CFDB54DFA9C944BADBBB2FF89300F1491A9D409AB355DB35AA86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: b16e3a311aa0ed86791dc2aacbf89dd71fe7e745d86cf1b3205de06aa48fb4cc
                                                                                    • Instruction ID: 8c05da1c6e99a25815f98540381e77ede803b57daa25be3dc67ce02da467dc25
                                                                                    • Opcode Fuzzy Hash: b16e3a311aa0ed86791dc2aacbf89dd71fe7e745d86cf1b3205de06aa48fb4cc
                                                                                    • Instruction Fuzzy Hash: DBC19274E01218CFDB54DFA9C944BADBBB2FF89300F1091A9D809AB355DB359A86CF10
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000004.00000002.4553644945.0000000004F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 04F40000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_4_2_4f40000_wrong bank details.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 35672410396b1ff7f29a3d053b577e5d022abb4791d490448acb707f957458ee
                                                                                    • Instruction ID: 91de5351f12d7406f72ab7f28ecb11e973327333b5d7ffa41de953c818f80986
                                                                                    • Opcode Fuzzy Hash: 35672410396b1ff7f29a3d053b577e5d022abb4791d490448acb707f957458ee
                                                                                    • Instruction Fuzzy Hash: 12C1A074E01218CFDB54DFA9C984BADBBB2FF89300F1091A9D409AB355DB359A86CF10